CVE-2021-23342

This affects the package docsify before 4.12.0. It is possible to bypass the remediation done by CVE-2020-7680 and execute malicious JavaScript through the following methods 1) When parsing HTML from remote URLs, the HTML code on the main page is sanitized, but this sanitization is not taking place in the sidebar. 2) The isURL external check can be bypassed by inserting more “////” characters
Configurations

Configuration 1 (hide)

cpe:2.3:a:docsifyjs:docsify:*:*:*:*:*:*:*:*

History

21 Nov 2024, 05:51

Type Values Removed Values Added
CVSS v2 : 4.3
v3 : 6.1
v2 : 4.3
v3 : 8.6
References () http://packetstormsecurity.com/files/161495/docsify-4.11.6-Cross-Site-Scripting.html - Exploit, Third Party Advisory () http://packetstormsecurity.com/files/161495/docsify-4.11.6-Cross-Site-Scripting.html - Exploit, Third Party Advisory
References () http://seclists.org/fulldisclosure/2021/Feb/71 - Mailing List, Third Party Advisory () http://seclists.org/fulldisclosure/2021/Feb/71 - Mailing List, Third Party Advisory
References () https://github.com/docsifyjs/docsify/commit/ff2a66f12752471277fe81a64ad6c4b2c08111fe - Patch, Third Party Advisory () https://github.com/docsifyjs/docsify/commit/ff2a66f12752471277fe81a64ad6c4b2c08111fe - Patch, Third Party Advisory
References () https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1076593 - Exploit, Third Party Advisory () https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1076593 - Exploit, Third Party Advisory
References () https://snyk.io/vuln/SNYK-JS-DOCSIFY-1066017 - Exploit, Third Party Advisory () https://snyk.io/vuln/SNYK-JS-DOCSIFY-1066017 - Exploit, Third Party Advisory

Information

Published : 2021-02-19 17:15

Updated : 2024-11-21 05:51


NVD link : CVE-2021-23342

Mitre link : CVE-2021-23342

CVE.ORG link : CVE-2021-23342


JSON object : View

Products Affected

docsifyjs

  • docsify
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')