Parsedown Class-Name Injection
High severity
GitHub Reviewed
Published
Mar 26, 2022
to the GitHub Advisory Database
•
Updated Sep 11, 2023
Description
Published to the GitHub Advisory Database
Mar 26, 2022
Reviewed
Mar 26, 2022
Last updated
Sep 11, 2023
Parsedown before 1.7.2, when safe mode is used and HTML markup is disabled, might allow attackers to execute arbitrary JavaScript code if a script (already running on the affected page) executes the contents of any element with a specific class. This occurs because spaces are permitted in code block infostrings, which interferes with the intended behavior of a single class name beginning with the language- substring.
References