remarkable@1.6.0 vulnerabilities

Markdown parser, done right. 100% Commonmark support, extensions, syntax plugins, high speed - all in one.

  • latest version

    2.0.1

  • latest non vulnerable version

  • first published

    11 years ago

  • latest version published

    5 years ago

  • licenses detected

  • Direct Vulnerabilities

    Known vulnerabilities in the remarkable package. This does not include vulnerabilities belonging to this package’s dependencies.

    Fix vulnerabilities automatically

    Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

    Fix for free
    VulnerabilityVulnerable Version
    • H
    Cross-site Scripting (XSS)

    remarkable is a markdown parsing library written in Javascript.

    Affected versions of this package are vulnerable to Cross-site Scripting (XSS). lib/parser_inline.js mishandles URL filtering, which allows attackers to trigger XSS via unprintable characters, as demonstrated by a \x0ejavascript: URL.

    How to fix Cross-site Scripting (XSS)?

    Upgrade remarkable to version 1.7.2 or higher.

    >=1.6.0 <1.7.2
    • H
    Regular Expression Denial of Service (ReDoS)

    remarkable is a markdown parsing library written in Javascript.

    Affected versions of this package are vulnerable to Regular Expression Denial of Service (ReDoS). lib/common/html_re.js allows Regular Expression Denial of Service (ReDoS) via a CDATA section.

    How to fix Regular Expression Denial of Service (ReDoS)?

    Upgrade remarkable to version 1.7.3 or higher.

    >=1.0.0 <1.7.3
    • M
    Cross-site Scripting (XSS)

    remarkable is a markdown parsing library written in Javascript.

    Affected versions of this package are vulnerable to Cross-site Scripting (XSS). It allowed the use of data: URIs for all mime types by default.

    Data URIs enable embedding small files in line in HTML documents, provided in the URL itself. Attackers can craft malicious web pages containing either HTML or script code that utilizes the data URI scheme, allowing them to bypass access controls or steal sensitive information.

    An example of data URI used to deliver javascript code. The data holds <script>alert('XSS')</script> tag in base64 encoded format.

    [xss link](data:text/html;base64,PHNjcmlwdD5hbGVydCgnWFNTJyk8L3NjcmlwdD4K)
    

    How to fix Cross-site Scripting (XSS)?

    Upgrade remarkable to version 1.7.0 or higher.

    <1.7.0