org.webjars:remarkable@1.3.0 vulnerabilities

  • latest version

    1.4.0

  • first published

    10 years ago

  • latest version published

    10 years ago

  • licenses detected

  • package manager

  • Direct Vulnerabilities

    Known vulnerabilities in the org.webjars:remarkable package. This does not include vulnerabilities belonging to this package’s dependencies.

    How to fix?

    Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

    Fix for free
    VulnerabilityVulnerable Version
    • H
    Regular Expression Denial of Service (ReDoS)

    org.webjars:remarkable is a markdown parsing library written in Javascript.

    Affected versions of this package are vulnerable to Regular Expression Denial of Service (ReDoS). lib/common/html_re.js allows Regular Expression Denial of Service (ReDoS) via a CDATA section.

    How to fix Regular Expression Denial of Service (ReDoS)?

    There is no fixed version for org.webjars:remarkable.

    [0,)
    • M
    Cross-site Scripting (XSS)

    org.webjars:remarkable is a markdown parsing library written in Javascript.

    Affected versions of this package are vulnerable to Cross-site Scripting (XSS). It allowed the use of data: URIs for all mime types by default.

    Data URIs enable embedding small files in line in HTML documents, provided in the URL itself. Attackers can craft malicious web pages containing either HTML or script code that utilizes the data URI scheme, allowing them to bypass access controls or steal sensitive information.

    An example of data URI used to deliver javascript code. The data holds <script>alert('XSS')</script> tag in base64 encoded format.

    [xss link](data:text/html;base64,PHNjcmlwdD5hbGVydCgnWFNTJyk8L3NjcmlwdD4K)
    

    How to fix Cross-site Scripting (XSS)?

    There is no fixed version for org.webjars:remarkable.

    [0,)
    • M
    Content Injection

    org.webjars:remarkable is a markdown parsing library written in Javascript.

    Affected versions of this package are vulnerable to Content Injection. Certain input when passed into remarkable will bypass the bad prototcol check that disallows the javascript: scheme allowing for javascript: url's to be injected into the rendered content.

    How to fix Content Injection?

    There is no fixed version for org.webjars:remarkable.

    [0,)