Multiple Content Injection Vulnerabilities Affecting marked Open this link in a new tab package, versions [,0.3.1)


0.0
medium
  • Attack Complexity

    Low

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • snyk-id

    SNYK-DOTNET-MARKED-60181

  • published

    6 Nov 2015

  • disclosed

    6 Nov 2015

  • credit

    Adam Baldwin

How to fix?

Upgrade to version 0.3.1 or later

Overview

Marked comes with an option to sanitize user output to help protect against content injection attacks.

sanitize: true

Even if this option is set, marked is vulnerable to content injection in multiple locations if untrusted user input is allowed to be provided into marked and that output is passed to the browser.

Injection is possible in two locations

  • gfm codeblocks (language)
  • javascript url's

Source: Node Security Project

References