Versions of the package markdown-to-jsx before 7.4.0 are vulnerable to Cross-site Scripting (XSS) via the src property due to improper input sanitization. An attacker can execute arbitrary code by injecting a malicious iframe element in the markdown.
References
Link | Resource |
---|---|
https://github.com/quantizor/markdown-to-jsx/commit/8eb74da825c0d8d2e9508d73c672bcae36ba555a | Patch |
https://security.snyk.io/vuln/SNYK-JS-MARKDOWNTOJSX-6258886 | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2024-10-15 05:15
Updated : 2024-10-17 20:36
NVD link : CVE-2024-21535
Mitre link : CVE-2024-21535
CVE.ORG link : CVE-2024-21535
JSON object : View
Products Affected
quantizor
- markdown-to-jsx
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')