@toast-ui/editor@2.3.1-alpha vulnerabilities

GFM Markdown Wysiwyg Editor - Productive and Extensible

  • latest version

    3.2.2

  • latest non vulnerable version

  • first published

    4 years ago

  • latest version published

    1 years ago

  • licenses detected

  • Direct Vulnerabilities

    Known vulnerabilities in the @toast-ui/editor package. This does not include vulnerabilities belonging to this package’s dependencies.

    How to fix?

    Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

    Fix for free
    VulnerabilityVulnerable Version
    • M
    Cross-site Scripting (XSS)

    @toast-ui/editor is a GFM Markdown Wysiwyg Editor.

    Affected versions of this package are vulnerable to Cross-site Scripting (XSS). Base tags are not sanitized which can be leveraged for XSS.

    How to fix Cross-site Scripting (XSS)?

    Upgrade @toast-ui/editor to version 3.0.2 or higher.

    <3.0.2
    • M
    Cross-site Scripting (XSS)

    @toast-ui/editor is a GFM Markdown Wysiwyg Editor.

    Affected versions of this package are vulnerable to Cross-site Scripting (XSS). User input is not properly sanitized before being included in the HTML context, specifically the href attribute of anchor tags.

    Steps to Reproduce

    1. Visit the following URL: https://nhn.github.io/tui.editor/latest/tutorial-example01-editor-basic
    2. Input in the left pane the following string by making sure the character after the 'j' and before the 'a' is a TAB (0x09) and not a sequence of spaces (0x20): `<a href='j avascript:alert(document.domain)'>click me</a>`
    3. Click on the "click me" text in the right page
    4. Notice the JavaScript code `alert(document.domain)` is executed
    
    The injected JavaScript code should be executed.
    

    How to fix Cross-site Scripting (XSS)?

    Upgrade @toast-ui/editor to version 3.0.2 or higher.

    <3.0.2