In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsLearn about Cross-site Scripting (XSS) vulnerabilities in an interactive lesson.
Start learningUpgrade marked
to version 0.3.9 or higher.
You can also patching it using Snyk wizard.
marked
is a markdown parser and compiler used for rendering markdown content to html.
Affected versions of the package allowed the use of data:
URIs for all mime types by default potentially opening a door for Cross-site Scripting (XSS) attacks.
Data URIs enable embedding small files in line in HTML documents, provided in the URL itself. Attackers can craft malicious web pages containing either HTML or script code that utilizes the data URI scheme, allowing them to bypass access controls or steal sensitive information.
An example of data URI used to deliver javascript code. The data holds <script>alert('XSS')</script>
tag in base64 encoded format.
[xss link](data:text/html;base64,PHNjcmlwdD5hbGVydCgnWFNTJyk8L3NjcmlwdD4K)
<>