Описание
Unsafe defaults in remark-html
Impact
The documentation of remark-html has mentioned that it was safe by default. In practise the default was never safe and had to be opted into. This means arbitrary HTML can be passed through leading to potential XSS attacks.
Patches
The problem has been patched in 13.0.2 and 14.0.1: remark-html is now safe by default, and the implementation matches the documentation.
Workarounds
On older affected versions, pass sanitize: true, like so:
References
n/a
For more information
If you have any questions or comments about this advisory:
- Open an issue in
remark-html - Email us at security@unifiedjs.com
Ссылки
- https://github.com/remarkjs/remark-html/security/advisories/GHSA-9q5w-79cv-947m
- https://nvd.nist.gov/vuln/detail/CVE-2021-39199
- https://github.com/remarkjs/remark-html/commit/b75c9dde582ad87ba498e369c033dc8a350478c1
- https://github.com/remarkjs/remark-html/releases/tag/14.0.1
- https://www.npmjs.com/package/remark-html
Пакеты
remark-html
< 13.0.2
13.0.2
remark-html
= 14.0.0
14.0.1
Связанные уязвимости
remark-html is an open source nodejs library which compiles Markdown to HTML. In affected versions the documentation of remark-html has mentioned that it was safe by default. In practice the default was never safe and had to be opted into. That is, user input was not sanitized. This means arbitrary HTML can be passed through leading to potential XSS attacks. The problem has been patched in 13.0.2 and 14.0.1: `remark-html` is now safe by default, and the implementation matches the documentation. On older affected versions, pass `sanitize: true` if you cannot update.