remark42 before 1.6.1 allows XSS, as demonstrated by "Locator: Locator{URL:" followed by an XSS payload. This is related to backend/app/store/comment.go and backend/app/store/service/service.go.
References
Link | Resource |
---|---|
https://github.com/umputun/remark42/compare/v1.6.0...v1.6.1 | Patch Third Party Advisory |
https://vuln.ryotak.me/advisories/19 | Third Party Advisory |
https://github.com/umputun/remark42/compare/v1.6.0...v1.6.1 | Patch Third Party Advisory |
https://vuln.ryotak.me/advisories/19 | Third Party Advisory |
Configurations
History
21 Nov 2024, 06:00
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/umputun/remark42/compare/v1.6.0...v1.6.1 - Patch, Third Party Advisory | |
References | () https://vuln.ryotak.me/advisories/19 - Third Party Advisory |
Information
Published : 2021-03-27 18:15
Updated : 2024-11-21 06:00
NVD link : CVE-2021-29271
Mitre link : CVE-2021-29271
CVE.ORG link : CVE-2021-29271
JSON object : View
Products Affected
remark42
- remark42
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')