Multiple Content Injection Vulnerabilities Affecting marked package, versions [,0.3.1)


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.24% (64th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DOTNET-MARKED-60181
  • published6 Nov 2015
  • disclosed6 Nov 2015
  • creditAdam Baldwin

Introduced: 6 Nov 2015

CVE-2014-1850  (opens in a new tab)
CVE-2014-3743  (opens in a new tab)
CWE-74  (opens in a new tab)

How to fix?

Upgrade to version 0.3.1 or later

Overview

Marked comes with an option to sanitize user output to help protect against content injection attacks.

sanitize: true

Even if this option is set, marked is vulnerable to content injection in multiple locations if untrusted user input is allowed to be provided into marked and that output is passed to the browser.

Injection is possible in two locations

  • gfm codeblocks (language)
  • javascript url's

Source: Node Security Project

Note: CVE-2014-1850 is a duplicate of CVE-2014-3743

CVSS Scores

version 3.1