High severityOSV Advisory· Published Apr 6, 2019· Updated Aug 4, 2024
CVE-2019-10905
CVE-2019-10905
Description
Parsedown before 1.7.2, when safe mode is used and HTML markup is disabled, might allow attackers to execute arbitrary JavaScript code if a script (already running on the affected page) executes the contents of any element with a specific class. This occurs because spaces are permitted in code block infostrings, which interferes with the intended behavior of a single class name beginning with the language- substring.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
erusev/parsedownPackagist | < 1.7.2 | 1.7.2 |
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- github.com/advisories/GHSA-62m3-fc7f-jpp8ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2019-10905ghsaADVISORY
- github.com/FriendsOfPHP/security-advisories/blob/master/erusev/parsedown/CVE-2019-10905.yamlghsaWEB
- github.com/erusev/parsedown/issues/699ghsax_refsource_MISCWEB
- github.com/erusev/parsedown/releases/tag/1.7.2ghsax_refsource_MISCWEB
News mentions
0No linked articles in our index yet.