First published: Thu May 31 2018(Updated: )
Affected versions of `marked` are susceptible to a cross-site scripting vulnerability in link components when `sanitize:true` is configured. ## Proof of Concept This flaw exists because link URIs containing HTML entities get processed in an abnormal manner. Any HTML Entities get parsed on a best-effort basis and included in the resulting link, while if that parsing fails that character is omitted. For example: A link URI such as ``` javascript֍ocument;alert(1) ``` Renders a valid link that when clicked will execute `alert(1)`. ## Recommendation Update to version 0.3.6 or later.
Credit: support@hackerone.com
Affected Software | Affected Version | How to fix |
---|---|---|
npm/marked | <0.3.6 | 0.3.6 |
Marked Project | <=0.3.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-10531 is classified as a high severity cross-site scripting vulnerability.
To fix CVE-2016-10531, upgrade the 'marked' package to version 0.3.7 or later.
CVE-2016-10531 affects marked versions up to and including 0.3.6.
If left unaddressed, CVE-2016-10531 could allow attackers to execute arbitrary JavaScript in the context of a victim's browser.
CVE-2016-10531 primarily impacts environments configuring marked with 'sanitize:true'.