All the vulnerabilities related to the version 0.1.0 of the package
Cross-site Scripting in remarkable
In remarkable 1.7.1, lib/parser_inline.js mishandles URL filtering, which allows attackers to trigger XSS via unprintable characters, as demonstrated by a \x0ejavascript:
URL.
Content Injection in remarkable
Versions 1.4.0 and earlier of remarkable
are affected by a cross-site scripting vulnerability. This occurs because vulnerable versions of remarkable
did not properly whitelist link protocols, and consequently allowed javascript:
to be used.
Markdown Source:
[link](<javascript:alert(1)>)
Rendered HTML:
<a href="javascript:alert(1)">link</a>
Update to version 1.4.1 or later
XSS in Data URI in remarkable
Affected versions of remarkable
are vulnerable to cross-site scripting. Vulnerable versions of the package allow the use of data:
URIs in links, and can therefore execute javascript.
[link](data:text/html,<script>alert('0')</script>)
Update to v1.7.0 or later
Regular Expression Denial of Service in remarkable
lib/common/html_re.js in remarkable 1.7.1 allows Regular Expression Denial of Service (ReDoS) via a CDATA section.