{
  "threat_severity" : "Moderate",
  "public_date" : "2021-01-22T00:00:00Z",
  "bugzilla" : {
    "description" : "sanitize-html: improper handling of internationalized domain name (IDN) can lead to bypass hostname whitelist validation",
    "id" : "1932362",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1932362"
  },
  "cvss3" : {
    "cvss3_base_score" : "5.3",
    "cvss3_scoring_vector" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
    "status" : "verified"
  },
  "cwe" : "CWE-20",
  "details" : [ "Apostrophe Technologies sanitize-html before 2.3.1 does not properly handle internationalized domain name (IDN) which could allow an attacker to bypass hostname whitelist validation set by the \"allowedIframeHostnames\" option." ],
  "affected_release" : [ {
    "product_name" : "Red Hat OpenShift Container Platform 4.7",
    "release_date" : "2021-02-24T00:00:00Z",
    "advisory" : "RHSA-2020:5633",
    "cpe" : "cpe:/a:redhat:openshift:4.7::el8",
    "package" : "openshift4/ose-console:v4.7.0-202102130115.p0"
  }, {
    "product_name" : "Red Hat OpenShift Container Platform 4.8",
    "release_date" : "2021-07-27T00:00:00Z",
    "advisory" : "RHSA-2021:2438",
    "cpe" : "cpe:/a:redhat:openshift:4.8::el8",
    "package" : "openshift4/ose-thanos-rhel8:v4.8.0-202106291913.p0.git.c358e96.assembly.stream"
  }, {
    "product_name" : "Red Hat OpenShift Container Platform 4.9",
    "release_date" : "2021-10-18T00:00:00Z",
    "advisory" : "RHSA-2021:3759",
    "cpe" : "cpe:/a:redhat:openshift:4.9::el8",
    "package" : "openshift4/ose-prometheus:v4.9.0-202109302016.p0.git.3197fa7.assembly.stream"
  } ],
  "package_state" : [ {
    "product_name" : "OpenShift Service Mesh 2.0",
    "fix_state" : "Affected",
    "package_name" : "servicemesh-prometheus",
    "cpe" : "cpe:/a:redhat:service_mesh:2.0"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2021-26539\nhttps://nvd.nist.gov/vuln/detail/CVE-2021-26539" ],
  "name" : "CVE-2021-26539",
  "csaw" : false
}