Parsedown version prior to 1.7.0 contains a Cross Site Scripting (XSS) vulnerability in `setMarkupEscaped` for escaping HTML that can result in JavaScript code execution. This attack appears to be exploitable via specially crafted markdown that allows it to side step HTML escaping by breaking AST boundaries. This vulnerability appears to have been fixed in 1.7.0 and later.
References
Link | Resource |
---|---|
https://github.com/Roave/SecurityAdvisories/issues/44#issuecomment-368594409 | Third Party Advisory |
https://github.com/erusev/parsedown/pull/495 | Third Party Advisory |
https://github.com/Roave/SecurityAdvisories/issues/44#issuecomment-368594409 | Third Party Advisory |
https://github.com/erusev/parsedown/pull/495 | Third Party Advisory |
Configurations
History
21 Nov 2024, 03:39
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/Roave/SecurityAdvisories/issues/44#issuecomment-368594409 - Third Party Advisory | |
References | () https://github.com/erusev/parsedown/pull/495 - Third Party Advisory |
Information
Published : 2018-04-18 19:29
Updated : 2024-11-21 03:39
NVD link : CVE-2018-1000162
Mitre link : CVE-2018-1000162
CVE.ORG link : CVE-2018-1000162
JSON object : View
Products Affected
parsedown
- parsedown
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')