// For flags

CVE-2020-26287

Stored XSS in mermaid diagrams

Severity Score

8.7
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

1
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

HedgeDoc is a collaborative platform for writing and sharing markdown. In HedgeDoc before version 1.7.1 an attacker can inject arbitrary `script` tags in HedgeDoc notes using mermaid diagrams. Our content security policy prevents loading scripts from most locations, but `www.google-analytics.com` is allowed. Using Google Tag Manger it is possible to inject arbitrary JavaScript and execute it on page load. Depending on the configuration of the instance, the attacker may not need authentication to create or edit notes. The problem is patched in HedgeDoc 1.7.1. As a workaround one can disallow `www.google-analytics.com` in the `Content-Security-Policy` header. Note that other ways to leverage the `script` tag injection might exist.

HedgeDoc es una plataforma colaborativa para escribir y compartir rebajas. En HedgeDoc versiones anteriores a 1.7.1, un atacante puede inyectar etiquetas "script" arbitrarias en las notas de HedgeDoc usando diagramas mermaid. Nuestra política de seguridad de contenido evita una carga de scripts de la mayoría de las ubicaciones, pero se permite "www.google-analytics.com" Usando Google Tag Manager, es posible inyectar JavaScript arbitrario y ejecutarlo al cargar la página. Dependiendo de la configuración de la instancia, es posible que el atacante no necesite autenticación para crear o editar notas. El problema está parcheado en HedgeDoc versión 1.7.1. Como solución alternativa, se puede rechazar "www.google-analytics.com" en el encabezado "Content-Security-Policy". Tome en cuenta que pueden presentar otras formas de aprovechar la inyección de etiquetas "script"

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
Required
Scope
Changed
Confidentiality
High
Integrity
High
Availability
None
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
None
Integrity
Partial
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2020-10-01 CVE Reserved
  • 2020-12-28 CVE Published
  • 2024-01-31 EPSS Updated
  • 2024-08-04 CVE Updated
  • 2024-08-04 First Exploit
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Hedgedoc
Search vendor "Hedgedoc"
Hedgedoc
Search vendor "Hedgedoc" for product "Hedgedoc"
< 1.7.1
Search vendor "Hedgedoc" for product "Hedgedoc" and version " < 1.7.1"
-
Affected