CVE-2022-41710 – electron-markdownify
Package
Manager: npm
Name: electron-markdownify
Vulnerable Version: >=0 <=1.4.1
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
CVSS v4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
EPSS: 0.0003 pctl0.06975
Details
Markdownify has Files or Directories Accessible to External Parties Markdownify version 1.4.1 allows an external attacker to remotely obtain arbitrary local files on any client that attempts to view a malicious markdown file through Markdownify. This is possible because the application does not have a CSP policy (or at least not strict enough) and/or does not properly validate the contents of markdown files before rendering them.
Metadata
Created: 2022-11-04T12:00:25Z
Modified: 2022-11-04T20:49:16Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/11/GHSA-qqhf-xfhw-7884/GHSA-qqhf-xfhw-7884.json
CWE IDs: ["CWE-552"]
Alternative ID: GHSA-qqhf-xfhw-7884
Finding: F123
Auto approve: 1