Multiple Content Injection Vulnerabilities Affecting marked package, versions <0.3.1
Threat Intelligence
EPSS
0.24% (65th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID npm:marked:20140131
- published 30 Jan 2014
- disclosed 30 Jan 2014
- credit Adam Baldwin
Introduced: 30 Jan 2014
CVE-2014-1850 Open this link in a new tabHow to fix?
Upgrade to version 0.3.1 or later
Overview
Marked comes with an option to sanitize user output to help protect against content injection attacks.
sanitize: true
Even if this option is set, marked is vulnerable to content injection in multiple locations if untrusted user input is allowed to be provided into marked and that output is passed to the browser.
Injection is possible in two locations
- gfm codeblocks (language)
- javascript url's
Source: Node Security Project
Note: CVE-2014-1850 is a duplicate of CVE-2014-3743
References
CVSS Scores
version 3.1