CVE-2024-36109

CoCalc is web-based software that enables collaboration in research, teaching, and scientific publishing. In affected versions the markdown parser allows `<script>` tags to be included which execute when published. This issue has been addressed in commit `419862a9c9879c`. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Configurations

No configuration.

History

21 Nov 2024, 09:21

Type Values Removed Values Added
References () https://github.com/sagemathinc/cocalc/commit/419862a9c9879c - () https://github.com/sagemathinc/cocalc/commit/419862a9c9879c -
References () https://github.com/sagemathinc/cocalc/security/advisories/GHSA-8w44-hggw-p5rf - () https://github.com/sagemathinc/cocalc/security/advisories/GHSA-8w44-hggw-p5rf -

29 May 2024, 13:02

Type Values Removed Values Added
Summary
  • (es) CoCalc es un software basado en web que permite la colaboración en investigación, enseñanza y publicación científica. En las versiones afectadas, el analizador de rebajas permite incluir etiquetas `

28 May 2024, 19:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-28 19:15

Updated : 2024-11-21 09:21


NVD link : CVE-2024-36109

Mitre link : CVE-2024-36109

CVE.ORG link : CVE-2024-36109


JSON object : View

Products Affected

No product.

CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')