MathJax version prior to version 2.7.4 contains a Cross Site Scripting (XSS) vulnerability in the \unicode{} macro that can result in Potentially untrusted Javascript running within a web browser. This attack appear to be exploitable via The victim must view a page where untrusted content is processed using Mathjax. This vulnerability appears to have been fixed in 2.7.4 and later.
References
Link | Resource |
---|---|
https://blog.bentkowski.info/2018/06/xss-in-google-colaboratory-csp-bypass.html | Exploit Third Party Advisory |
https://github.com/mathjax/MathJax/commit/a55da396c18cafb767a26aa9ad96f6f4199852f1 | Patch Third Party Advisory |
https://blog.bentkowski.info/2018/06/xss-in-google-colaboratory-csp-bypass.html | Exploit Third Party Advisory |
https://github.com/mathjax/MathJax/commit/a55da396c18cafb767a26aa9ad96f6f4199852f1 | Patch Third Party Advisory |
Configurations
History
21 Nov 2024, 03:57
Type | Values Removed | Values Added |
---|---|---|
References | () https://blog.bentkowski.info/2018/06/xss-in-google-colaboratory-csp-bypass.html - Exploit, Third Party Advisory | |
References | () https://github.com/mathjax/MathJax/commit/a55da396c18cafb767a26aa9ad96f6f4199852f1 - Patch, Third Party Advisory |
Information
Published : 2018-07-23 16:29
Updated : 2024-11-21 03:57
NVD link : CVE-2018-1999024
Mitre link : CVE-2018-1999024
CVE.ORG link : CVE-2018-1999024
JSON object : View
Products Affected
mathjax
- mathjax
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')