markdown-it-katex through 2.0.3 is vulnerable to Cross-Site Scripting (XSS). The package fails to properly escape error messages, which may allow attackers to execute arbitrary JavaScript in a victim's browser by triggering an error.
This issue has been automatically marked as stale because it has not had recent activity. It will be closed if no further activity occurs. Thank you for your contributions.
WS-2020-0101 - High Severity Vulnerability
Vulnerable Library - markdown-it-katex-2.0.3.tgz
Fast math support for markdown-it with KaTeX
Library home page: https://registry.npmjs.org/markdown-it-katex/-/markdown-it-katex-2.0.3.tgz
Path to dependency file: /tmp/ws-scm/AID/components/dashboard/package.json
Path to vulnerable library: /tmp/ws-scm/AID/components/dashboard/node_modules/markdown-it-katex/package.json
Dependency Hierarchy: - vue-markdown-2.2.4.tgz (Root Library) - :x: **markdown-it-katex-2.0.3.tgz** (Vulnerable Library)
Found in HEAD commit: 9ca64796fe86d58b01f4b98fd3c9e302f9e9766c
Vulnerability Details
markdown-it-katex through 2.0.3 is vulnerable to Cross-Site Scripting (XSS). The package fails to properly escape error messages, which may allow attackers to execute arbitrary JavaScript in a victim's browser by triggering an error.
Publish Date: 2020-05-20
URL: WS-2020-0101
CVSS 3 Score Details (7.4)
Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: None
For more information on CVSS3 Scores, click here.Step up your Open Source Security Game with WhiteSource here