Описание
MarkText through 0.16.3 does not sanitize the input of a mermaid block before rendering. This could lead to Remote Code Execution via a .md file containing a mutation Cross-Site Scripting (XSS) payload.
Ссылки
- ExploitIssue TrackingPatchThird Party Advisory
- PatchThird Party Advisory
- ExploitIssue TrackingPatchThird Party Advisory
- PatchThird Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 0.16.3 (включая)
cpe:2.3:a:marktext:marktext:*:*:*:*:*:*:*:*
EPSS
Процентиль: 79%
0.012
Низкий
9 Critical
CVSS3
6.8 Medium
CVSS2
Дефекты
CWE-79
Связанные уязвимости
github
около 4 лет назад
MarkText through 0.16.3 does not sanitize the input of a mermaid block before rendering. This could lead to Remote Code Execution via a .md file containing a mutation Cross-Site Scripting (XSS) payload.
EPSS
Процентиль: 79%
0.012
Низкий
9 Critical
CVSS3
6.8 Medium
CVSS2
Дефекты
CWE-79