logo

CVE-2022-41710 electron-markdownify

Package

Manager: npm
Name: electron-markdownify
Vulnerable Version: >=0 <=1.4.1

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N

CVSS v4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N

EPSS: 0.0003 pctl0.06975

Details

Markdownify has Files or Directories Accessible to External Parties Markdownify version 1.4.1 allows an external attacker to remotely obtain arbitrary local files on any client that attempts to view a malicious markdown file through Markdownify. This is possible because the application does not have a CSP policy (or at least not strict enough) and/or does not properly validate the contents of markdown files before rendering them.

Metadata

Created: 2022-11-04T12:00:25Z
Modified: 2022-11-04T20:49:16Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/11/GHSA-qqhf-xfhw-7884/GHSA-qqhf-xfhw-7884.json
CWE IDs: ["CWE-552"]
Alternative ID: GHSA-qqhf-xfhw-7884
Finding: F123
Auto approve: 1