Описание
Parsedown before 1.7.2, when safe mode is used and HTML markup is disabled, might allow attackers to execute arbitrary JavaScript code if a script (already running on the affected page) executes the contents of any element with a specific class. This occurs because spaces are permitted in code block infostrings, which interferes with the intended behavior of a single class name beginning with the language- substring.
Ссылки
- ExploitIssue TrackingThird Party Advisory
- Release NotesThird Party Advisory
- ExploitIssue TrackingThird Party Advisory
- Release NotesThird Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 1.7.2 (исключая)
cpe:2.3:a:parsedown:parsedown:*:*:*:*:*:*:*:*
EPSS
Процентиль: 66%
0.00521
Низкий
8.1 High
CVSS3
6.8 Medium
CVSS2
Дефекты
CWE-79
Связанные уязвимости
EPSS
Процентиль: 66%
0.00521
Низкий
8.1 High
CVSS3
6.8 Medium
CVSS2
Дефекты
CWE-79