CVE-2018-1999024

MathJax version prior to version 2.7.4 contains a Cross Site Scripting (XSS) vulnerability in the \unicode{} macro that can result in Potentially untrusted Javascript running within a web browser. This attack appear to be exploitable via The victim must view a page where untrusted content is processed using Mathjax. This vulnerability appears to have been fixed in 2.7.4 and later.
Configurations

Configuration 1 (hide)

cpe:2.3:a:mathjax:mathjax:*:*:*:*:*:*:*:*

History

21 Nov 2024, 03:57

Type Values Removed Values Added
References () https://blog.bentkowski.info/2018/06/xss-in-google-colaboratory-csp-bypass.html - Exploit, Third Party Advisory () https://blog.bentkowski.info/2018/06/xss-in-google-colaboratory-csp-bypass.html - Exploit, Third Party Advisory
References () https://github.com/mathjax/MathJax/commit/a55da396c18cafb767a26aa9ad96f6f4199852f1 - Patch, Third Party Advisory () https://github.com/mathjax/MathJax/commit/a55da396c18cafb767a26aa9ad96f6f4199852f1 - Patch, Third Party Advisory

Information

Published : 2018-07-23 16:29

Updated : 2024-11-21 03:57


NVD link : CVE-2018-1999024

Mitre link : CVE-2018-1999024

CVE.ORG link : CVE-2018-1999024


JSON object : View

Products Affected

mathjax

  • mathjax
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')