remarkable@1.1.1 vulnerabilities

Markdown parser, done right. 100% Commonmark support, extensions, syntax plugins, high speed - all in one.

Direct Vulnerabilities

Known vulnerabilities in the remarkable package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • H
Regular Expression Denial of Service (ReDoS)

remarkable is a markdown parsing library written in Javascript.

Affected versions of this package are vulnerable to Regular Expression Denial of Service (ReDoS). lib/common/html_re.js allows Regular Expression Denial of Service (ReDoS) via a CDATA section.

How to fix Regular Expression Denial of Service (ReDoS)?

Upgrade remarkable to version 1.7.3 or higher.

>=1.0.0 <1.7.3
  • M
Cross-site Scripting (XSS)

remarkable is a markdown parsing library written in Javascript.

Affected versions of this package are vulnerable to Cross-site Scripting (XSS). It allowed the use of data: URIs for all mime types by default.

Data URIs enable embedding small files in line in HTML documents, provided in the URL itself. Attackers can craft malicious web pages containing either HTML or script code that utilizes the data URI scheme, allowing them to bypass access controls or steal sensitive information.

An example of data URI used to deliver javascript code. The data holds <script>alert('XSS')</script> tag in base64 encoded format.

[xss link](data:text/html;base64,PHNjcmlwdD5hbGVydCgnWFNTJyk8L3NjcmlwdD4K)

How to fix Cross-site Scripting (XSS)?

Upgrade remarkable to version 1.7.0 or higher.

<1.7.0
  • M
Cross-site Scripting (XSS)

remarkable is a markdown parsing library written in Javascript.

Affected versions of this package are vulnerable to Cross-site Scripting (XSS). It allowed the use of data: URIs for all mime types by default.

Data URIs enable embedding small files in line in HTML documents, provided in the URL itself. Attackers can craft malicious web pages containing either HTML or script code that utilizes the data URI scheme, allowing them to bypass access controls or steal sensitive information.

An example of data URI used to deliver javascript code. The data holds <script>alert('XSS')</script> tag in base64 encoded format.

[xss link](data:text/html;base64,PHNjcmlwdD5hbGVydCgnWFNTJyk8L3NjcmlwdD4K)

How to fix Cross-site Scripting (XSS)?

Upgrade remarkable to version 1.7.0 or higher.

<1.7.0
  • M
Content Injection

remarkable is a markdown parsing library written in Javascript.

Affected versions of this package are vulnerable to Content Injection. Certain input when passed into remarkable will bypass the bad prototcol check that disallows the javascript: scheme allowing for javascript: url's to be injected into the rendered content.

How to fix Content Injection?

Upgrade remarkable to version 1.4.1 or higher.

<1.4.1
  • M
Content Injection

remarkable is a markdown parsing library written in Javascript.

Affected versions of this package are vulnerable to Content Injection. Certain input when passed into remarkable will bypass the bad prototcol check that disallows the javascript: scheme allowing for javascript: url's to be injected into the rendered content.

How to fix Content Injection?

Upgrade remarkable to version 1.4.1 or higher.

<1.4.1