Description
Parsedown before 1.7.2, when safe mode is used and HTML markup is disabled, might allow attackers to execute arbitrary JavaScript code if a script (already running on the affected page) executes the contents of any element with a specific class. This occurs because spaces are permitted in code block infostrings, which interferes with the intended behavior of a single class name beginning with the language- substring.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-1333 | Parsedown before 1.7.2, when safe mode is used and HTML markup is disabled, might allow attackers to execute arbitrary JavaScript code if a script (already running on the affected page) executes the contents of any element with a specific class. This occurs because spaces are permitted in code block infostrings, which interferes with the intended behavior of a single class name beginning with the language- substring. |
Github GHSA |
GHSA-62m3-fc7f-jpp8 | Parsedown Class-Name Injection |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T22:40:14.992Z
Reserved: 2019-04-06T00:00:00.000Z
Link: CVE-2019-10905
No data.
Status : Modified
Published: 2019-04-06T20:29:00.447
Modified: 2024-11-21T04:20:06.170
Link: CVE-2019-10905
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA