A specially crafted Markdown document could cause the execution of malicious JavaScript code in Caret Editor before 4.0.0-rc22.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/161072/Caret-Editor-4.0.0-rc21-Remote-Code-Execution.html | Third Party Advisory VDB Entry |
http://seclists.org/fulldisclosure/2021/Jan/59 | Mailing List Third Party Advisory |
https://caret.io | Product |
https://github.com/careteditor/issues/issues/841 | Issue Tracking Third Party Advisory |
https://github.com/careteditor/releases-beta/releases/tag/4.0.0-rc22 | Release Notes Third Party Advisory |
https://seclists.org/fulldisclosure/2021/Jan/59 | Mailing List Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2021-01-26 18:15
Updated : 2024-02-04 21:23
NVD link : CVE-2020-20269
Mitre link : CVE-2020-20269
CVE.ORG link : CVE-2020-20269
JSON object : View
Products Affected
caret
- caret
CWE