CVE-2016-10531

Priority
Description
marked is an application that is meant to parse and compile markdown. Due
to the way that marked 0.3.5 and earlier parses input, specifically HTML
entities, it's possible to bypass marked's content injection protection
(`sanitize: true`) to inject a `javascript:` URL. This flaw exists because
`&#xNNanything;` gets parsed to what it could and leaves the rest behind,
resulting in just `anything;` being left.
Notes
Package
Upstream:released (0.3.6)
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 ESM (Trusty Tahr):DNE (trusty was needed)
Ubuntu 16.04 LTS (Xenial Xerus):needed
Ubuntu 18.04 LTS (Bionic Beaver):not-affected (0.3.6+dfsg-1)
Ubuntu 19.10 (Eoan Ermine):not-affected (0.3.6+dfsg-1)
Ubuntu 20.04 (Focal Fossa):not-affected (0.3.6+dfsg-1)
More Information

Updated: 2020-01-29 18:27:10 UTC (commit 40f18bf14da5fb50662e1f861ea594a462b207fe)