CVE-2014-10065
UNKNOWN
Published 2018-05-31T20:00:00Z
Actions:
Expert Analysis
Professional remediation guidance
Get tailored security recommendations from our analyst team for CVE-2014-10065. We'll provide specific mitigation strategies based on your environment and risk profile.
No CVSS data available
Description
Certain input when passed into remarkable before 1.4.1 will bypass the bad protocol check that disallows the javascript: scheme allowing for javascript: url's to be injected into the rendered content.
Available Exploits
No exploits available for this CVE.
Related News
No news articles found for this CVE.
Affected Products
Affected Versions:
GitHub Security Advisories
Community-driven vulnerability intelligence from GitHub
Advisory Details
Versions 1.4.0 and earlier of `remarkable` are affected by a cross-site scripting vulnerability. This occurs because vulnerable versions of `remarkable` did not properly whitelist link protocols, and consequently allowed `javascript:` to be used.
### Proof of Concept
Markdown Source:
```
[link](<javascript:alert(1)>)
```
Rendered HTML:
```
<a href="javascript:alert(1)">link</a>
```
## Recommendation
Update to version 1.4.1 or later
Affected Packages
npm
remarkable
ECOSYSTEM:
≥0
<1.4.1
CVSS Scoring
CVSS Score
7.5
References
Advisory provided by GitHub Security Advisory Database. Published: August 31, 2020, Modified: August 31, 2020
References
Published: 2018-05-31T20:00:00Z
Last Modified: 2024-09-16T22:25:48.380Z
Copied to clipboard!