vulnerability
Red Hat OpenShift: CVE-2023-24540: golang: html/template: improper handling of JavaScript whitespace
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 10 | (AV:N/AC:L/Au:N/C:C/I:C/A:C) | May 11, 2023 | Jun 8, 2023 | Aug 11, 2025 |
Severity
10
CVSS
(AV:N/AC:L/Au:N/C:C/I:C/A:C)
Published
May 11, 2023
Added
Jun 8, 2023
Modified
Aug 11, 2025
Description
Not all valid JavaScript whitespace characters are considered to be whitespace. Templates containing whitespace characters outside of the character set "\t\n\f\r\u0020\u2028\u2029" in JavaScript contexts that also contain actions may not be properly sanitized during execution.
Solutions
linuxrpm-upgrade-buildahlinuxrpm-upgrade-openshiftlinuxrpm-upgrade-openshift-clientslinuxrpm-upgrade-podmanlinuxrpm-upgrade-skopeo
References
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.