CoCalc is web-based software that enables collaboration in research, teaching, and scientific publishing. In affected versions the markdown parser allows `<script>` tags to be included which execute when published. This issue has been addressed in commit `419862a9c9879c`. Users are advised to upgrade. There are no known workarounds for this vulnerability.
References
Configurations
No configuration.
History
21 Nov 2024, 09:21
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/sagemathinc/cocalc/commit/419862a9c9879c - | |
References | () https://github.com/sagemathinc/cocalc/security/advisories/GHSA-8w44-hggw-p5rf - |
29 May 2024, 13:02
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
28 May 2024, 19:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-05-28 19:15
Updated : 2024-11-21 09:21
NVD link : CVE-2024-36109
Mitre link : CVE-2024-36109
CVE.ORG link : CVE-2024-36109
JSON object : View
Products Affected
No product.
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')