logo

CVE-2014-10065 remarkable

Package

Manager: npm
Name: remarkable
Vulnerable Version: >=0 <1.4.1

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N/E:H/RL:U/RC:C

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N

EPSS: 0.0024 pctl0.47184

Details

Content Injection in remarkable Versions 1.4.0 and earlier of `remarkable` are affected by a cross-site scripting vulnerability. This occurs because vulnerable versions of `remarkable` did not properly whitelist link protocols, and consequently allowed `javascript:` to be used. ### Proof of Concept Markdown Source: ``` [link](<javascript:alert(1)>) ``` Rendered HTML: ``` <a href="javascript:alert(1)">link</a> ``` ## Recommendation Update to version 1.4.1 or later

Metadata

Created: 2020-08-31T22:56:00Z
Modified: 2020-08-31T18:08:29Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2020/08/GHSA-f9vc-q3hh-qhfv/GHSA-f9vc-q3hh-qhfv.json
CWE IDs: ["CWE-94"]
Alternative ID: GHSA-f9vc-q3hh-qhfv
Finding: F422
Auto approve: 1