Lucene search

K
cve[email protected]CVE-2024-28246
HistoryMar 25, 2024 - 8:15 p.m.

CVE-2024-28246

2024-03-2520:15:08
CWE-184
CWE-697
web.nvd.nist.gov
38
katex
javascript
vulnerability
malicious input
protocol
upgrade
nvd

5.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L

5.4 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

25.9%

KaTeX is a JavaScript library for TeX math rendering on the web. Code that uses KaTeX’s trust option, specifically that provides a function to blacklist certain URL protocols, can be fooled by URLs in malicious inputs that use uppercase characters in the protocol. In particular, this can allow for malicious input to generate javascript: links in the output, even if the trust function tries to forbid this protocol via trust: (context) => context.protocol !== 'javascript'. Upgrade to KaTeX v0.16.10 to remove this vulnerability.

Affected configurations

Vulners
Node
katexkatexRange0.11.00.16.10

CNA Affected

[
  {
    "vendor": "KaTeX",
    "product": "KaTeX",
    "versions": [
      {
        "version": ">= 0.11.0, < 0.16.10",
        "status": "affected"
      }
    ]
  }
]

5.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L

5.4 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

25.9%