{"vulnerability": "CVE-2024-52595", "sightings": [{"uuid": "71e44d89-876b-431b-a19f-614b4e460c84", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52595", "type": "seen", "source": "https://infosec.exchange/users/dragonjar/statuses/113560234590577110", "content": "", "creation_timestamp": "2024-11-28T11:01:07.135836Z"}, {"uuid": "25f11dc0-9fe1-4ee6-b453-8dfa23da2604", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52595", "type": "seen", "source": "https://t.me/cvedetector/11533", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-52595 - \"lxml HTML Cleaner Vulnerability - Cross-Site Scripting via Improper Context-Switching of Special Tags\"\", \n  \"Content\": \"CVE ID : CVE-2024-52595 \nPublished : Nov. 19, 2024, 10:15 p.m. | 39\u00a0minutes ago \nDescription : lxml_html_clean is a project for HTML cleaning functionalities copied from `lxml.html.clean`. Prior to version 0.4.0, the HTML Parser in lxml does not properly handle context-switching for special HTML tags such as ``, `` and ``. This behavior deviates from how web browsers parse and interpret such tags. Specifically, content in CSS comments is ignored by lxml_html_clean but may be interpreted differently by web browsers, enabling malicious scripts to bypass the cleaning process. This vulnerability could lead to Cross-Site Scripting (XSS) attacks, compromising the security of users relying on lxml_html_clean in default configuration for sanitizing untrusted HTML content. Users employing the HTML cleaner in a security-sensitive context should upgrade to lxml 0.4.0, which addresses this issue. As a temporary mitigation, users can configure lxml_html_clean with the following settings to prevent the exploitation of this vulnerability. Via `remove_tags`, one may specify tags to remove - their content is moved to their parents' tags. Via `kill_tags`, one may specify tags to be removed completely. Via `allow_tags`, one may restrict the set of permissible tags, excluding context-switching tags like ``, `` and ``. \nSeverity: 7.7 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"19 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-20T00:21:54.000000Z"}, {"uuid": "62ea5e06-8665-44c6-9ebc-77092c8db2e9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52595", "type": "seen", "source": "https://t.me/suboxone_chatroom/1532", "content": "#exploit\n1. CVE-2024-5907, CVE-2024-9469:\nLPE/Privilege Escalation in Palo Alto Cortex XDR Agent\nhttps://blog.scrt.ch/2024/12/05/attacking-cortex-xdr-from-an-unprivileged-user-perspective\n\n2. CVE 2024-37397:\nIvanti Endpoint Manager XXE\nhttps://d4mianwayne.github.io/posts/ivanti-endpoint-manager-xxe-cve-2024-37397\n\n3. CVE-2024-52595:\nMutation XSS &amp; lxml_html_clean bypass\nhttps://jorianwoltjer.com/blog/p/hacking/mutation-xss", "creation_timestamp": "2025-01-27T07:06:24.000000Z"}, {"uuid": "53bd52a9-0ce5-4e53-88c3-c10a1c3e0752", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52595", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/11552", "content": "#exploit\n1. CVE-2024-5907, CVE-2024-9469:\nLPE/Privilege Escalation in Palo Alto Cortex XDR Agent\nhttps://blog.scrt.ch/2024/12/05/attacking-cortex-xdr-from-an-unprivileged-user-perspective\n\n2. CVE 2024-37397:\nIvanti Endpoint Manager XXE\nhttps://d4mianwayne.github.io/posts/ivanti-endpoint-manager-xxe-cve-2024-37397\n\n3. CVE-2024-52595:\nMutation XSS &amp; lxml_html_clean bypass\nhttps://jorianwoltjer.com/blog/p/hacking/mutation-xss", "creation_timestamp": "2024-12-13T16:50:37.000000Z"}]}