Parsedown version prior to 1.7.0 contains a Cross Site Scripting (XSS) vulnerability in `setMarkupEscaped` for escaping HTML that can result in JavaScript code execution. This attack appears to be exploitable via specially crafted markdown that allows it to side step HTML escaping by breaking AST boundaries. This vulnerability appears to have been fixed in 1.7.0 and later. References: https://github.com/erusev/parsedown/pull/495 https://github.com/Roave/SecurityAdvisories/issues/44
Created php-erusev-parsedown tracking bugs for this issue: Affects: fedora-all [bug 1569514] Affects: epel-all [bug 1569513]
All dependent bugs have been closed. Can this tracking bug be closed?