Cross-site scripting vulnerability in Zettlr from 0.20.0 to 1.8.8 allows an attacker to execute an arbitrary script by loading a file or code snippet containing an invalid iframe into Zettlr.
References
Link | Resource |
---|---|
https://github.com/Zettlr/Zettlr | Third Party Advisory |
https://jvn.jp/en/jp/JVN98239374/index.html | Third Party Advisory |
https://www.zettlr.com/ | Product |
https://github.com/Zettlr/Zettlr | Third Party Advisory |
https://jvn.jp/en/jp/JVN98239374/index.html | Third Party Advisory |
https://www.zettlr.com/ | Product |
Configurations
History
21 Nov 2024, 05:47
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/Zettlr/Zettlr - Third Party Advisory | |
References | () https://jvn.jp/en/jp/JVN98239374/index.html - Third Party Advisory | |
References | () https://www.zettlr.com/ - Product |
Information
Published : 2021-05-27 09:15
Updated : 2024-11-21 05:47
NVD link : CVE-2021-20727
Mitre link : CVE-2021-20727
CVE.ORG link : CVE-2021-20727
JSON object : View
Products Affected
zettlr
- zettlr
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')