Опубликовано: 22 апр. 2020
Источник: github
Github: Прошло ревью
CVSS4: 5.1
CVSS3: 6.1
Описание
XSS in python-markdown2
python-markdown2 through 2.3.8 allows XSS because element names are mishandled unless a \w+ match succeeds. For example, an attack might use elementname@ or elementname- with an onclick attribute.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2020-11888
- https://github.com/trentm/python-markdown2/issues/348
- https://github.com/pypa/advisory-database/tree/main/vulns/markdown2/PYSEC-2020-65.yaml
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6XOAIRJJCZNJUALXDHSIGH5PS2H63A3J
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AQLRBGRVRRZK7P5SFL2MNGXFX37YHJAV
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PN6QSHRFZXRQAYZJQ4MOW5MKIXBYOMED
- http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00031.html
- http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00035.html
Пакеты
Наименование
markdown2
pip
Затронутые версииВерсия исправления
<= 2.3.8
2.3.9
Связанные уязвимости
CVSS3: 6.1
ubuntu
почти 6 лет назад
python-markdown2 through 2.3.8 allows XSS because element names are mishandled unless a \w+ match succeeds. For example, an attack might use elementname@ or elementname- with an onclick attribute.
CVSS3: 6.1
nvd
почти 6 лет назад
python-markdown2 through 2.3.8 allows XSS because element names are mishandled unless a \w+ match succeeds. For example, an attack might use elementname@ or elementname- with an onclick attribute.
CVSS3: 6.1
debian
почти 6 лет назад
python-markdown2 through 2.3.8 allows XSS because element names are mi ...