CVE-2020-11888: XSS in python-markdown2
(updated )
python-markdown2 through 2.3.8 allows XSS because element names are mishandled unless a \w+ match succeeds. For example, an attack might use elementname@ or elementname- with an onclick attribute.
References
- github.com/advisories/GHSA-fv3h-8x5j-pvgq
- github.com/pypa/advisory-database/tree/main/vulns/markdown2/PYSEC-2020-65.yaml
- github.com/trentm/python-markdown2
- github.com/trentm/python-markdown2/issues/348
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6XOAIRJJCZNJUALXDHSIGH5PS2H63A3J
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AQLRBGRVRRZK7P5SFL2MNGXFX37YHJAV
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PN6QSHRFZXRQAYZJQ4MOW5MKIXBYOMED
- nvd.nist.gov/vuln/detail/CVE-2020-11888
Detect and mitigate CVE-2020-11888 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →