Vulnerability Details : CVE-2020-26287
HedgeDoc is a collaborative platform for writing and sharing markdown. In HedgeDoc before version 1.7.1 an attacker can inject arbitrary `script` tags in HedgeDoc notes using mermaid diagrams. Our content security policy prevents loading scripts from most locations, but `www.google-analytics.com` is allowed. Using Google Tag Manger it is possible to inject arbitrary JavaScript and execute it on page load. Depending on the configuration of the instance, the attacker may not need authentication to create or edit notes. The problem is patched in HedgeDoc 1.7.1. As a workaround one can disallow `www.google-analytics.com` in the `Content-Security-Policy` header. Note that other ways to leverage the `script` tag injection might exist.
Vulnerability category: Cross site scripting (XSS)
Products affected by CVE-2020-26287
- cpe:2.3:a:hedgedoc:hedgedoc:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2020-26287
0.46%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 73 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2020-26287
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.3
|
MEDIUM | AV:N/AC:M/Au:N/C:N/I:P/A:N |
8.6
|
2.9
|
NIST | |
8.7
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N |
2.3
|
5.8
|
NIST | |
8.7
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N |
2.3
|
5.8
|
GitHub, Inc. |
CWE ids for CVE-2020-26287
-
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.Assigned by:
- nvd@nist.gov (Primary)
- security-advisories@github.com (Secondary)
References for CVE-2020-26287
-
https://github.com/hedgedoc/hedgedoc/releases/tag/1.7.1
Release HedgeDoc 1.7.1 · hedgedoc/hedgedoc · GitHubThird Party Advisory
-
https://github.com/hedgedoc/hedgedoc/security/advisories/GHSA-g6w6-7xf9-m95p
Stored XSS in mermaid diagrams · Advisory · hedgedoc/hedgedoc · GitHubThird Party Advisory
-
https://github.com/Alemmi/ctf-writeups/blob/main/hxpctf-2020/hackme/solution.md
ctf-writeups/solution.md at main · Alemmi/ctf-writeups · GitHubExploit;Third Party Advisory
-
https://github.com/hedgedoc/hedgedoc/commit/58276ebbf4504a682454a3686dcaff88bc1069d4
Merge pull request from GHSA-g6w6-7xf9-m95p · hedgedoc/hedgedoc@58276eb · GitHubPatch;Third Party Advisory
-
https://github.com/hackmdio/codimd/issues/1630
Stored XSS in mermaid · Issue #1630 · hackmdio/codimd · GitHubThird Party Advisory
Jump to