Skip to content
This repository has been archived by the owner on Aug 5, 2024. It is now read-only.

markdown-to-jsx-6.10.3.tgz: 1 vulnerabilities (highest severity is: 6.5) #39

Open
mend-for-github-com bot opened this issue Jul 25, 2022 · 0 comments
Labels
Mend: dependency security vulnerability Security vulnerability detected by Mend

Comments

@mend-for-github-com
Copy link

mend-for-github-com bot commented Jul 25, 2022

Vulnerable Library - markdown-to-jsx-6.10.3.tgz

Convert markdown to JSX with ease for React and React-like projects. Super lightweight and highly configurable.

Library home page: https://registry.npmjs.org/markdown-to-jsx/-/markdown-to-jsx-6.10.3.tgz

Path to dependency file: /package.json

Path to vulnerable library: /node_modules/markdown-to-jsx/package.json

Found in HEAD commit: 7b22d0a7359c50785295f4edb6dc17a5631e26e0

Vulnerabilities

CVE Severity CVSS Dependency Type Fixed in (markdown-to-jsx version) Remediation Possible**
WS-2020-0103 Medium 6.5 markdown-to-jsx-6.10.3.tgz Direct 6.11.4

**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation

Details

WS-2020-0103

Vulnerable Library - markdown-to-jsx-6.10.3.tgz

Convert markdown to JSX with ease for React and React-like projects. Super lightweight and highly configurable.

Library home page: https://registry.npmjs.org/markdown-to-jsx/-/markdown-to-jsx-6.10.3.tgz

Path to dependency file: /package.json

Path to vulnerable library: /node_modules/markdown-to-jsx/package.json

Dependency Hierarchy:

  • markdown-to-jsx-6.10.3.tgz (Vulnerable Library)

Found in HEAD commit: 7b22d0a7359c50785295f4edb6dc17a5631e26e0

Found in base branch: main

Vulnerability Details

Versions of markdown-to-jsx prior to 6.11.4 are vulnerable to Cross-Site Scripting. Due to insufficient input sanitization the package may render output containing malicious JavaScript. This vulnerability can be exploited through input of links containing data or VBScript URIs and a base64-encoded payload.

Publish Date: 2020-05-20

URL: WS-2020-0103

CVSS 3 Score Details (6.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: Low
    • Integrity Impact: Low
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Release Date: 2020-05-20

Fix Resolution: 6.11.4

⛑️ Automatic Remediation will be attempted for this issue.


⛑️Automatic Remediation will be attempted for this issue.

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
Mend: dependency security vulnerability Security vulnerability detected by Mend
Projects
None yet
Development

No branches or pull requests

0 participants