logo

CVE-2016-10531 marked

Package

Manager: npm
Name: marked
Vulnerable Version: >=0 <0.3.6

Severity

Level: Medium

CVSS v3.1: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00289 pctl0.51958

Details

Sanitization bypass using HTML Entities in marked Affected versions of `marked` are susceptible to a cross-site scripting vulnerability in link components when `sanitize:true` is configured. ## Proof of Concept This flaw exists because link URIs containing HTML entities get processed in an abnormal manner. Any HTML Entities get parsed on a best-effort basis and included in the resulting link, while if that parsing fails that character is omitted. For example: A link URI such as ``` javascript&#x58document;alert&#40;1&#41; ``` Renders a valid link that when clicked will execute `alert(1)`. ## Recommendation Update to version 0.3.6 or later.

Metadata

Created: 2019-02-18T23:58:20Z
Modified: 2023-09-07T22:23:29Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2019/02/GHSA-vfvf-mqq8-rwqc/GHSA-vfvf-mqq8-rwqc.json
CWE IDs: ["CWE-79"]
Alternative ID: GHSA-vfvf-mqq8-rwqc
Finding: F008
Auto approve: 1