In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsLearn about Cross-site Scripting (XSS) vulnerabilities in an interactive lesson.
Start learningUpgrade marked
to version 0.3.6 or higher.
Also, you can patch the vulnerability using Snyk wizard. Alternatively you can use remarkable
or other markdown libraries.
marked
is a markdown parser and compiler used for rendering markdown content to html.
It is vulnerable to content injection attack allowing the attacker to bypass its output sanitization (sanitize: true
) protection. Using the HTML Coded Character Set, attackers can inject javascript:
code snippets into the output. For example, the following input javascript֍ocument;alert(1)
will result in alert(1)
being executed when the user clicks on the link.
<>