marked is an application that is meant to parse and compile markdown. Due to the way that marked 0.3.5 and earlier parses input, specifically HTML entities, it's possible to bypass marked's content injection protection (`sanitize: true`) to inject a `javascript:` URL. This flaw exists because `&#xNNanything;` gets parsed to what it could and leaves the rest behind, resulting in just `anything;` being left.
Advisories
Source ID Title
EUVD EUVD EUVD-2019-0347 marked is an application that is meant to parse and compile markdown. Due to the way that marked 0.3.5 and earlier parses input, specifically HTML entities, it's possible to bypass marked's content injection protection (`sanitize: true`) to inject a `javascript:` URL. This flaw exists because `&#xNNanything;` gets parsed to what it could and leaves the rest behind, resulting in just `anything;` being left.
Github GHSA Github GHSA GHSA-vfvf-mqq8-rwqc Sanitization bypass using HTML Entities in marked
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: hackerone

Published:

Updated: 2024-09-17T04:28:55.235Z

Reserved: 2017-10-29T00:00:00

Link: CVE-2016-10531

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2018-05-31T20:29:01.033

Modified: 2024-11-21T02:44:12.767

Link: CVE-2016-10531

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses