First published: Mon Jan 11 2021(Updated: )
Redcarpet is a Ruby library for Markdown processing. In Redcarpet before version 3.5.1, there is an injection vulnerability which can enable a cross-site scripting attack. In affected versions no HTML escaping was being performed when processing quotes. This applies even when the `:escape_html` option was being used. This is fixed in version 3.5.1 by the referenced commit.
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
rubygems/redcarpet | <3.5.1 | 3.5.1 |
Redcarpet Project Redcarpet | <3.5.1 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
debian/ruby-redcarpet | 3.4.0-4+deb10u1 3.5.1-1 3.6.0-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-26298 is a vulnerability in the Redcarpet Ruby library that allows for a cross-site scripting attack.
CVE-2020-26298 allows for HTML injection in Redcarpet, potentially enabling a cross-site scripting attack.
The severity of CVE-2020-26298 is rated as medium, with a severity value of 6.8.
To fix CVE-2020-26298, update Redcarpet to version 3.5.1 or later.
You can find more information about CVE-2020-26298 on the following references: [link 1](https://github.com/vmg/redcarpet/commit/a699c82292b17c8e6a62e1914d5eccc252272793), [link 2](https://github.com/vmg/redcarpet/blob/master/CHANGELOG.md#version-351-security), [link 3](https://rubygems.org/gems/redcarpet).