Mark Text through 0.16.3 allows attackers arbitrary command execution. This could lead to Remote Code Execution (RCE) by opening .md files containing a mutation Cross Site Scripting (XSS) payload.
References
Link | Resource |
---|---|
https://github.com/marktext/marktext/issues/2548 | Exploit Third Party Advisory |
Configurations
History
12 Apr 2021, 12:03
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-79 | |
CVSS |
v2 : v3 : |
v2 : 6.8
v3 : 9.6 |
References | (MISC) https://github.com/marktext/marktext/issues/2548 - Exploit, Third Party Advisory | |
CPE | cpe:2.3:a:marktext:marktext:*:*:*:*:*:*:*:* |
05 Apr 2021, 08:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2021-04-05 08:15
Updated : 2023-12-10 13:55
NVD link : CVE-2021-29996
Mitre link : CVE-2021-29996
CVE.ORG link : CVE-2021-29996
JSON object : View
Products Affected
marktext
- marktext
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')