mdx-mermaid provides plug and play access to Mermaid in MDX. There is a potential for an arbitrary javascript injection in versions less than 1.3.0 and 2.0.0-rc1. Modify any mermaid code blocks with arbitrary code and it will execute when the component is loaded by MDXjs. This vulnerability was patched in version(s) 1.3.0 and 2.0.0-rc2. There are currently no known workarounds.
References
Link | Resource |
---|---|
https://github.com/sjwall/mdx-mermaid/commit/f2b99386660fd13316823529c3f1314ebbcdfd2a | Patch Third Party Advisory |
https://github.com/sjwall/mdx-mermaid/security/advisories/GHSA-rvgm-35jw-q628 | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
01 Sep 2022, 20:50
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-08-29 18:15
Updated : 2024-02-04 22:51
NVD link : CVE-2022-36036
Mitre link : CVE-2022-36036
CVE.ORG link : CVE-2022-36036
JSON object : View
Products Affected
mdx-mermaid_project
- mdx-mermaid
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')