CVE-2021-39175
XSS vector in slide mode speaker-view
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
HedgeDoc is a platform to write and share markdown. In versions prior to 1.9.0, an unauthenticated attacker can inject arbitrary JavaScript into the speaker-notes of the slide-mode feature by embedding an iframe hosting the malicious code into the slides or by embedding the HedgeDoc instance into another page. The problem is patched in version 1.9.0. There are no known workarounds aside from upgrading.
HedgeDoc es una plataforma para escribir y compartir markdown. En versiones anteriores a1.9.0, un atacante no autenticado puede inyectar JavaScript arbitrario en las notas de los oradores de la función de modo de diapositivas al insertar un iframe que aloje el código malicioso en las diapositivas o al insertar la instancia de HedgeDoc en otra página. El problema está parcheado en versión 1.9.0. No se conocen soluciones aparte de la actualización.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2021-08-16 CVE Reserved
- 2021-08-30 CVE Published
- 2024-08-04 CVE Updated
- 2024-12-17 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
- CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
- CWE-346: Origin Validation Error
CAPEC
References (4)
URL | Tag | Source |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://github.com/hedgedoc/hedgedoc/pull/1369 | 2022-10-25 | |
https://github.com/hedgedoc/hedgedoc/pull/1375 | 2022-10-25 | |
https://github.com/hedgedoc/hedgedoc/pull/1513 | 2022-10-25 | |
https://github.com/hedgedoc/hedgedoc/security/advisories/GHSA-j748-779h-9697 | 2022-10-25 |
URL | Date | SRC |
---|