mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
71 lines
2.2 KiB
JSON
71 lines
2.2 KiB
JSON
{
|
|
"CVE_data_meta" : {
|
|
"ASSIGNER" : "kurt@seifried.org",
|
|
"DATE_ASSIGNED" : "2018-04-06T14:09:26.584701",
|
|
"DATE_REQUESTED" : "2018-03-29T08:35:18",
|
|
"ID" : "CVE-2018-1000162",
|
|
"REQUESTER" : "aidantwoods+dwf@gmail.com",
|
|
"STATE" : "PUBLIC"
|
|
},
|
|
"affects" : {
|
|
"vendor" : {
|
|
"vendor_data" : [
|
|
{
|
|
"product" : {
|
|
"product_data" : [
|
|
{
|
|
"product_name" : "Parsedown",
|
|
"version" : {
|
|
"version_data" : [
|
|
{
|
|
"version_value" : "prior to version 1.7.0"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name" : "parsedown"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format" : "MITRE",
|
|
"data_type" : "CVE",
|
|
"data_version" : "4.0",
|
|
"description" : {
|
|
"description_data" : [
|
|
{
|
|
"lang" : "eng",
|
|
"value" : "Parsedown version prior to 1.7.0 contains a Cross Site Scripting (XSS) vulnerability in `setMarkupEscaped` for escaping HTML that can result in JavaScript code execution. This attack appears to be exploitable via specially crafted markdown that allows it to side step HTML escaping by breaking AST boundaries. This vulnerability appears to have been fixed in 1.7.0 and later."
|
|
}
|
|
]
|
|
},
|
|
"problemtype" : {
|
|
"problemtype_data" : [
|
|
{
|
|
"description" : [
|
|
{
|
|
"lang" : "eng",
|
|
"value" : "Cross Site Scripting (XSS)"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references" : {
|
|
"reference_data" : [
|
|
{
|
|
"name" : "https://github.com/Roave/SecurityAdvisories/issues/44#issuecomment-368594409",
|
|
"refsource" : "MISC",
|
|
"url" : "https://github.com/Roave/SecurityAdvisories/issues/44#issuecomment-368594409"
|
|
},
|
|
{
|
|
"name" : "https://github.com/erusev/parsedown/pull/495",
|
|
"refsource" : "MISC",
|
|
"url" : "https://github.com/erusev/parsedown/pull/495"
|
|
}
|
|
]
|
|
}
|
|
}
|