Vulnerability Description
KaTeX is a JavaScript library for TeX math rendering on the web. Code that uses KaTeX's `trust` option, specifically that provides a function to blacklist certain URL protocols, can be fooled by URLs in malicious inputs that use uppercase characters in the protocol. In particular, this can allow for malicious input to generate `javascript:` links in the output, even if the `trust` function tries to forbid this protocol via `trust: (context) => context.protocol !== 'javascript'`. Upgrade to KaTeX v0.16.10 to remove this vulnerability.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Katex | Katex | >= 0.11.0, < 0.16.10 |
Related Weaknesses (CWE)
References
- https://github.com/KaTeX/KaTeX/commit/fc5af64183a3ceb9be9d1c23a275999a728593dePatch
- https://github.com/KaTeX/KaTeX/security/advisories/GHSA-3wc5-fcw2-2329MitigationThird Party Advisory
- https://github.com/KaTeX/KaTeX/commit/fc5af64183a3ceb9be9d1c23a275999a728593dePatch
- https://github.com/KaTeX/KaTeX/security/advisories/GHSA-3wc5-fcw2-2329MitigationThird Party Advisory
FAQ
What is CVE-2024-28246?
CVE-2024-28246 is a vulnerability with a CVSS score of 5.5 (MEDIUM). KaTeX is a JavaScript library for TeX math rendering on the web. Code that uses KaTeX's `trust` option, specifically that provides a function to blacklist certain URL protocols, can be fooled by URLs ...
How severe is CVE-2024-28246?
CVE-2024-28246 has been rated MEDIUM with a CVSS base score of 5.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-28246?
Check the references section above for vendor advisories and patch information. Affected products include: Katex Katex.