Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

RUSTSEC-2021-0063: XSS in comrak #154

Open
github-actions bot opened this issue Jun 2, 2022 · 0 comments
Open

RUSTSEC-2021-0063: XSS in comrak #154

github-actions bot opened this issue Jun 2, 2022 · 0 comments

Comments

@github-actions
Copy link

github-actions bot commented Jun 2, 2022

XSS in comrak

Details
Package comrak
Version 0.7.0
URL https://github.com/kivikakk/comrak/releases/tag/0.10.1
Date 2021-05-04
Patched versions >=0.10.1

comrak operates by default in a "safe"
mode of operation where unsafe content, such as arbitrary raw HTML or URLs with
non-standard schemes, are not permitted in the output. This is per the
reference GFM implementation, cmark-gfm.

Ampersands were not being correctly escaped in link targets, making it possible
to fashion unsafe URLs using schemes like data: or javascript: by entering
them as HTML entities, e.g. &#x64&#x61&#x74&#x61&#x3a. The intended
behaviour, demonstrated upstream, is that these should be escaped and therefore
harmless, but this behaviour was broken in comrak.

See advisory page for additional details.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

0 participants