First published: Tue Oct 15 2024(Updated: )
Versions of the package markdown-to-jsx before 7.4.0 are vulnerable to Cross-site Scripting (XSS) via the src property due to improper input sanitization. An attacker can execute arbitrary code by injecting a malicious iframe element in the markdown.
Credit: report@snyk.io report@snyk.io
Affected Software | Affected Version | How to fix |
---|---|---|
npm/markdown-to-jsx | <7.4.0 | 7.4.0 |
Quantizor Markdown-to-jsx | <7.4.0 | |
IBM Security Verify Governance - Identity Manager | <=ISVG 10.0.2 | |
IBM Security Verify Governance, Identity Manager Software Stack | <=ISVG 10.0.2 | |
IBM Security Verify Governance, Identity Manager Virtual Appliance | <=ISVG 10.0.2 | |
IBM Security Verify Governance Identity Manager Container | <=ISVG 10.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-21535 is classified as a high severity vulnerability due to the potential for Cross-site Scripting (XSS) attacks.
To fix CVE-2024-21535, update the markdown-to-jsx package to version 7.4.0 or later.
CVE-2024-21535 allows attackers to execute arbitrary code via XSS by injecting malicious elements within the markdown.
CVE-2024-21535 affects all versions of the markdown-to-jsx package prior to 7.4.0.
CVE-2024-21535 is associated with the vendor Quantizor, which maintains the markdown-to-jsx package.