PyPi: Mistune

CVE-2017-15612

Safety vulnerability ID: 35030

This vulnerability was reviewed by experts

The information on this page was manually curated by our Cybersecurity Intelligence Team.

Created at Oct 19, 2017 Updated at Dec 03, 2024
Scan your Python projects for vulnerabilities →

Advisory

Mistune.py in mistune 0.7.4 allows XSS via an unexpected newline (such as in java\nscript:) or a crafted email address, related to the escape and autolink functions. See CVE-2017-15612.
https://github.com/lepture/mistune/pull/140

Affected package

mistune

Latest version: 3.0.2

A sane and fast Markdown parser with useful plugins and renderers

Affected versions

Fixed versions

Vulnerability changelog

~~~~~~~~~~~

Released on Oct. 26, 2017

* Remove non breaking spaces preprocessing
* Remove rev and rel attribute for footnotes
* Fix bypassing XSS vulnerability by junorouse

This version is strongly recommended, since it fixed
a security issue.

Resources

Use this package?

Scan your Python project for dependency vulnerabilities in two minutes

Scan your application

Severity Details

CVSS Base Score

MEDIUM 6.1

CVSS v3 Details

MEDIUM 6.1
Attack Vector (AV)
NETWORK
Attack Complexity (AC)
LOW
Privileges Required (PR)
NONE
User Interaction (UI)
REQUIRED
Scope (S)
CHANGED
Confidentiality Impact (C)
LOW
Integrity Impact (I)
LOW
Availability Availability (A)
NONE

CVSS v2 Details

MEDIUM 4.3
Access Vector (AV)
NETWORK
Access Complexity (AC)
MEDIUM
Authentication (Au)
NONE
Confidentiality Impact (C)
NONE
Integrity Impact (I)
PARTIAL
Availability Impact (A)
NONE