All the vulnerabilities related to the version 4.0.0 of the package
Unsafe defaults in remark-html
The documentation of remark-html
has mentioned that it was safe by default. In practise the default was never safe and had to be opted into. This means arbitrary HTML can be passed through leading to potential XSS attacks.
The problem has been patched in 13.0.2 and 14.0.1: remark-html
is now safe by default, and the implementation matches the documentation.
On older affected versions, pass sanitize: true
, like so:
- .use(remarkHtml)
+ .use(remarkHtml, {sanitize: true})
n/a
If you have any questions or comments about this advisory:
remark-html
Regular Expression Denial of Service in trim
All versions of package trim lower than 0.0.3 are vulnerable to Regular Expression Denial of Service (ReDoS) via trim().