Skip to content

HTML Injection in marky-markdown

Moderate severity GitHub Reviewed Published Sep 3, 2020 to the GitHub Advisory Database • Updated Jan 9, 2023

Package

npm marky-markdown (npm)

Affected versions

>= 0.0.0

Patched versions

None

Description

All versions of marky-markdown are vulnerable to HTML Injection due to a validation bypass. The package only allows iframes where the source is youtube.com but it is possible to bypass the validation with sources where youtube.com is the sub-domain, such as youtube.com.evil.co. This

Recommendation

This package is no longer maintained. Please upgrade to @npmcorp/marky-markdown

References

Reviewed Aug 31, 2020
Published to the GitHub Advisory Database Sep 3, 2020
Last updated Jan 9, 2023

Severity

Moderate

EPSS score

Weaknesses

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. Learn more on MITRE.

CVE ID

No known CVE

GHSA ID

GHSA-pxmp-fwjc-4x7q

Source code

Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.