An issue was discovered in markdown2 (aka python-markdown2) through 2.3.5. The safe_mode feature, which is supposed to sanitize user input against XSS, is flawed and does not escape the input properly. With a crafted payload, XSS can be triggered, as demonstrated by omitting the final '>' character from an IMG tag.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2018-0089 | An issue was discovered in markdown2 (aka python-markdown2) through 2.3.5. The safe_mode feature, which is supposed to sanitize user input against XSS, is flawed and does not escape the input properly. With a crafted payload, XSS can be triggered, as demonstrated by omitting the final '>' character from an IMG tag. |
Github GHSA |
GHSA-p6h9-gw49-rqm4 | markdown2 is vulnerable to cross-site scripting |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
| Link | Providers |
|---|---|
| https://github.com/trentm/python-markdown2/issues/285 |
|
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-09-16T17:47:46.652Z
Reserved: 2018-01-18T00:00:00Z
Link: CVE-2018-5773
No data.
Status : Modified
Published: 2018-01-18T21:29:00.267
Modified: 2024-11-21T04:09:22.067
Link: CVE-2018-5773
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA