Search criteria
1 vulnerability by remark
CVE-2021-39199 (GCVE-0-2021-39199)
Vulnerability from cvelistv5 – Published: 2021-09-07 18:50 – Updated: 2024-08-04 01:58
VLAI?
Title
Cross site scripting via unsafe defaults in remark-html
Summary
remark-html is an open source nodejs library which compiles Markdown to HTML. In affected versions the documentation of remark-html has mentioned that it was safe by default. In practice the default was never safe and had to be opted into. That is, user input was not sanitized. This means arbitrary HTML can be passed through leading to potential XSS attacks. The problem has been patched in 13.0.2 and 14.0.1: `remark-html` is now safe by default, and the implementation matches the documentation. On older affected versions, pass `sanitize: true` if you cannot update.
Severity ?
10 (Critical)
CWE
- CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Assigner
References
| URL | Tags | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| remarkjs | remark-html |
Affected:
>= 14.0.0, < 14.0.1
Affected: < 13.0.2 |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T01:58:18.276Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://github.com/remarkjs/remark-html/security/advisories/GHSA-9q5w-79cv-947m"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/remarkjs/remark-html/commit/b75c9dde582ad87ba498e369c033dc8a350478c1"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/remarkjs/remark-html/releases/tag/14.0.1"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.npmjs.com/package/remark-html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "remark-html",
"vendor": "remarkjs",
"versions": [
{
"status": "affected",
"version": "\u003e= 14.0.0, \u003c 14.0.1"
},
{
"status": "affected",
"version": "\u003c 13.0.2"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "remark-html is an open source nodejs library which compiles Markdown to HTML. In affected versions the documentation of remark-html has mentioned that it was safe by default. In practice the default was never safe and had to be opted into. That is, user input was not sanitized. This means arbitrary HTML can be passed through leading to potential XSS attacks. The problem has been patched in 13.0.2 and 14.0.1: `remark-html` is now safe by default, and the implementation matches the documentation. On older affected versions, pass `sanitize: true` if you cannot update."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 10,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-79",
"description": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-09-07T18:50:11",
"orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"shortName": "GitHub_M"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://github.com/remarkjs/remark-html/security/advisories/GHSA-9q5w-79cv-947m"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/remarkjs/remark-html/commit/b75c9dde582ad87ba498e369c033dc8a350478c1"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/remarkjs/remark-html/releases/tag/14.0.1"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.npmjs.com/package/remark-html"
}
],
"source": {
"advisory": "GHSA-9q5w-79cv-947m",
"discovery": "UNKNOWN"
},
"title": "Cross site scripting via unsafe defaults in remark-html",
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "security-advisories@github.com",
"ID": "CVE-2021-39199",
"STATE": "PUBLIC",
"TITLE": "Cross site scripting via unsafe defaults in remark-html"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "remark-html",
"version": {
"version_data": [
{
"version_value": "\u003e= 14.0.0, \u003c 14.0.1"
},
{
"version_value": "\u003c 13.0.2"
}
]
}
}
]
},
"vendor_name": "remarkjs"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "remark-html is an open source nodejs library which compiles Markdown to HTML. In affected versions the documentation of remark-html has mentioned that it was safe by default. In practice the default was never safe and had to be opted into. That is, user input was not sanitized. This means arbitrary HTML can be passed through leading to potential XSS attacks. The problem has been patched in 13.0.2 and 14.0.1: `remark-html` is now safe by default, and the implementation matches the documentation. On older affected versions, pass `sanitize: true` if you cannot update."
}
]
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 10,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/remarkjs/remark-html/security/advisories/GHSA-9q5w-79cv-947m",
"refsource": "CONFIRM",
"url": "https://github.com/remarkjs/remark-html/security/advisories/GHSA-9q5w-79cv-947m"
},
{
"name": "https://github.com/remarkjs/remark-html/commit/b75c9dde582ad87ba498e369c033dc8a350478c1",
"refsource": "MISC",
"url": "https://github.com/remarkjs/remark-html/commit/b75c9dde582ad87ba498e369c033dc8a350478c1"
},
{
"name": "https://github.com/remarkjs/remark-html/releases/tag/14.0.1",
"refsource": "MISC",
"url": "https://github.com/remarkjs/remark-html/releases/tag/14.0.1"
},
{
"name": "https://www.npmjs.com/package/remark-html",
"refsource": "MISC",
"url": "https://www.npmjs.com/package/remark-html"
}
]
},
"source": {
"advisory": "GHSA-9q5w-79cv-947m",
"discovery": "UNKNOWN"
}
}
}
},
"cveMetadata": {
"assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"assignerShortName": "GitHub_M",
"cveId": "CVE-2021-39199",
"datePublished": "2021-09-07T18:50:11",
"dateReserved": "2021-08-16T00:00:00",
"dateUpdated": "2024-08-04T01:58:18.276Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}