HedgeDoc is a platform to write and share markdown. In versions prior to 1.9.0, an unauthenticated attacker can inject arbitrary JavaScript into the speaker-notes of the slide-mode feature by embedding an iframe hosting the malicious code into the slides or by embedding the HedgeDoc instance into another page. The problem is patched in version 1.9.0. There are no known workarounds aside from upgrading.
References
Link | Resource |
---|---|
https://github.com/hedgedoc/hedgedoc/pull/1369 | Patch Third Party Advisory |
https://github.com/hedgedoc/hedgedoc/pull/1513 | Patch Third Party Advisory |
https://github.com/hedgedoc/hedgedoc/pull/1375 | Patch Third Party Advisory |
https://github.com/hedgedoc/hedgedoc/security/advisories/GHSA-j748-779h-9697 | Patch Third Party Advisory |
Configurations
Information
Published : 2021-08-30 14:15
Updated : 2022-10-25 11:01
NVD link : CVE-2021-39175
Mitre link : CVE-2021-39175
JSON object : View
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Products Affected
hedgedoc
- hedgedoc