First published: Wed Oct 19 2022(Updated: )
Markdownify version 1.4.1 allows an external attacker to execute arbitrary code remotely on any client attempting to view a malicious markdown file through Markdownify. This is possible because the application has the "nodeIntegration" option enabled.
Credit: help@fluidattacks.com
Affected Software | Affected Version | How to fix |
---|---|---|
Markdownify | =1.4.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-41709 has a high severity rating due to its ability to allow remote code execution.
To fix CVE-2022-41709, update Markdownify to version 1.4.2 or later which disables the 'nodeIntegration' option.
All users of Markdownify version 1.4.1 are affected by CVE-2022-41709.
Attackers exploiting CVE-2022-41709 can execute arbitrary code remotely on vulnerable clients.
Yes, CVE-2022-41709 is a confirmed vulnerability reported in Markdownify version 1.4.1.