Vulnerability Description
PHP cebe markdown parser version 1.2.0 and earlier contains a Cross Site Scripting (XSS) vulnerability in all distributed parsers allowing a malicious crafted script to be executed that can result in the lose of user data and sensitive user information. This attack can be exploited by crafting a three backtick wrapped payload with a character in front: L: "```<script>alert();</script>```". NOTE: This has been argued as a non-issue (see references) since it is not the parser's job to sanitize malicious code from a parsed document
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Cebe | Markdown | <= 1.2.0 |
Related Weaknesses (CWE)
References
- https://github.com/cebe/markdown/issues/166ExploitIssue TrackingThird Party Advisory
- https://github.com/cebe/markdown/issues/166#issuecomment-508230493
- https://github.com/cebe/markdown/issues/166ExploitIssue TrackingThird Party Advisory
- https://github.com/cebe/markdown/issues/166#issuecomment-508230493
FAQ
What is CVE-2018-1000874?
CVE-2018-1000874 is a vulnerability with a CVSS score of 6.1 (MEDIUM). PHP cebe markdown parser version 1.2.0 and earlier contains a Cross Site Scripting (XSS) vulnerability in all distributed parsers allowing a malicious crafted script to be executed that can result in ...
How severe is CVE-2018-1000874?
CVE-2018-1000874 has been rated MEDIUM with a CVSS base score of 6.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-1000874?
Check the references section above for vendor advisories and patch information. Affected products include: Cebe Markdown.