Bug 1569512 (CVE-2018-1000162)

Summary: CVE-2018-1000162 php-erusev-parsedown: Cross Site Scripting in `setMarkupEscaped`
Product: [Other] Security Response Reporter: Andrej Nemec <anemec>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: shawn
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: php-erusev-parsedown 1.7.0 Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2019-03-21 13:45:42 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1569513, 1569514    
Bug Blocks:    

Description Andrej Nemec 2018-04-19 12:22:06 UTC
Parsedown version prior to 1.7.0 contains a Cross Site Scripting (XSS) vulnerability in `setMarkupEscaped` for escaping HTML that can result in JavaScript code execution. This attack appears to be exploitable via specially crafted markdown that allows it to side step HTML escaping by breaking AST boundaries. This vulnerability appears to have been fixed in 1.7.0 and later.

References:

https://github.com/erusev/parsedown/pull/495
https://github.com/Roave/SecurityAdvisories/issues/44

Comment 1 Andrej Nemec 2018-04-19 12:22:25 UTC
Created php-erusev-parsedown tracking bugs for this issue:

Affects: fedora-all [bug 1569514]
Affects: epel-all [bug 1569513]

Comment 2 Shawn Iwinski 2019-03-21 03:32:18 UTC
All dependent bugs have been closed.  Can this tracking bug be closed?