Cross-site Scripting (XSS) Affecting marked package, versions [,0.3.9)


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Cross-site Scripting (XSS) vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-DOTNET-MARKED-60185
  • published12 Jan 2017
  • disclosed12 Jan 2017
  • creditSnyk Security Research Team

Introduced: 12 Jan 2017

CVE NOT AVAILABLE CWE-79  (opens in a new tab)
First added by Snyk

How to fix?

Upgrade marked to version 0.3.9 or higher. You can also patching it using Snyk wizard.

Overview

marked is a markdown parser and compiler used for rendering markdown content to html.

Affected versions of the package allowed the use of data: URIs for all mime types by default potentially opening a door for Cross-site Scripting (XSS) attacks.

Data URIs enable embedding small files in line in HTML documents, provided in the URL itself. Attackers can craft malicious web pages containing either HTML or script code that utilizes the data URI scheme, allowing them to bypass access controls or steal sensitive information.

An example of data URI used to deliver javascript code. The data holds <script>alert('XSS')</script> tag in base64 encoded format.

[xss link](data:text/html;base64,PHNjcmlwdD5hbGVydCgnWFNTJyk8L3NjcmlwdD4K)

Details

<>

References

CVSS Scores

version 3.1