Bug 1608169 (CVE-2018-1999024)

Summary: CVE-2018-1999024 mathjax: Cross-site scripting (XSS) flaw in the \unicode macro
Product: [Other] Security Response Reporter: Sam Fowler <sfowler>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED UPSTREAM QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: zbyszek
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: mathjax 2.7.4 Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2019-06-10 10:34:21 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1608170, 1608171    
Bug Blocks:    

Description Sam Fowler 2018-07-25 06:05:11 UTC
MathJax before version 2.7.4 is vulnerable to cross-site script (XSS) injection via the \unicode macro. An attacker could exploit this to execute arbitrary Javascript in a victim's browser.


External Reference:

https://blog.bentkowski.info/2018/06/xss-in-google-colaboratory-csp-bypass.html


Upstream Commit:

https://github.com/mathjax/MathJax/commit/a55da396c18cafb767a26aa9ad96f6f4199852f1

Comment 1 Sam Fowler 2018-07-25 06:05:33 UTC
Created mathjax tracking bugs for this issue:

Affects: epel-all [bug 1608171]
Affects: fedora-all [bug 1608170]

Comment 2 Product Security DevOps Team 2019-06-10 10:34:21 UTC
This CVE Bugzilla entry is for community support informational purposes only as it does not affect a package in a commercially supported Red Hat product. Refer to the dependent bugs for status of those individual community products.