A specially crafted Markdown document could cause the execution of malicious JavaScript code in Caret Editor before 4.0.0-rc22.
References
Link | Resource |
---|---|
http://seclists.org/fulldisclosure/2021/Jan/59 | Mailing List Third Party Advisory |
https://github.com/careteditor/issues/issues/841 | Issue Tracking Third Party Advisory |
https://seclists.org/fulldisclosure/2021/Jan/59 | Mailing List Third Party Advisory |
https://github.com/careteditor/releases-beta/releases/tag/4.0.0-rc22 | Release Notes Third Party Advisory |
http://packetstormsecurity.com/files/161072/Caret-Editor-4.0.0-rc21-Remote-Code-Execution.html | Third Party Advisory VDB Entry |
https://caret.io | Product |
Configurations
Configuration 1 (hide)
|
Information
Published : 2021-01-26 10:15
Updated : 2021-01-29 16:07
NVD link : CVE-2020-20269
Mitre link : CVE-2020-20269
JSON object : View
CWE
Products Affected
caret
- caret