Lucene search

K
cvelistGitHub_MCVELIST:CVE-2024-28246
HistoryMar 25, 2024 - 8:00 p.m.

CVE-2024-28246 KaTeX is missing normalization of the protocol in URLs allows bypassing forbidden protocols

2024-03-2520:00:17
CWE-184
CWE-697
GitHub_M
www.cve.org
katex
javascript library
tex math rendering
url protocol
bypassing forbidden protocols
vulnerability
upgrade

5.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L

5.8 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

25.9%

KaTeX is a JavaScript library for TeX math rendering on the web. Code that uses KaTeX’s trust option, specifically that provides a function to blacklist certain URL protocols, can be fooled by URLs in malicious inputs that use uppercase characters in the protocol. In particular, this can allow for malicious input to generate javascript: links in the output, even if the trust function tries to forbid this protocol via trust: (context) => context.protocol !== 'javascript'. Upgrade to KaTeX v0.16.10 to remove this vulnerability.

CNA Affected

[
  {
    "vendor": "KaTeX",
    "product": "KaTeX",
    "versions": [
      {
        "version": ">= 0.11.0, < 0.16.10",
        "status": "affected"
      }
    ]
  }
]

5.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L

5.8 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

25.9%

Related for CVELIST:CVE-2024-28246