CVE-2024-21535

Versions of the package markdown-to-jsx before 7.4.0 are vulnerable to Cross-site Scripting (XSS) via the src property due to improper input sanitization. An attacker can execute arbitrary code by injecting a malicious iframe element in the markdown.
Configurations

Configuration 1 (hide)

cpe:2.3:a:quantizor:markdown-to-jsx:*:*:*:*:*:*:*:*

History

17 Oct 2024, 20:36

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.1
First Time Quantizor
Quantizor markdown-to-jsx
CWE CWE-79
References () https://github.com/quantizor/markdown-to-jsx/commit/8eb74da825c0d8d2e9508d73c672bcae36ba555a - () https://github.com/quantizor/markdown-to-jsx/commit/8eb74da825c0d8d2e9508d73c672bcae36ba555a - Patch
References () https://security.snyk.io/vuln/SNYK-JS-MARKDOWNTOJSX-6258886 - () https://security.snyk.io/vuln/SNYK-JS-MARKDOWNTOJSX-6258886 - Third Party Advisory
CPE cpe:2.3:a:quantizor:markdown-to-jsx:*:*:*:*:*:*:*:*

15 Oct 2024, 05:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-10-15 05:15

Updated : 2024-10-17 20:36


NVD link : CVE-2024-21535

Mitre link : CVE-2024-21535


JSON object : View

Products Affected

quantizor

  • markdown-to-jsx
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')