JVN#21174546
Marp vulnerable to improper access control in JavaScript execution
Overview
Marp is vulnerable to improper access control in JavaScript execution.
Products Affected
- Marp v0.0.10 and earlier
Description
Marp is a tool to create a presentation PDF with Markdown. Marp executes JavaScript inside the Markdown contents. Marp allows JavaScript to access local resources and files (CWE-284).
Impact
When reading specially crafted Markdown contents, local files may be accessed and leaked to an external source.
Solution
Update the software
Update to the latest version according to the information provided by the developer.
Marp v0.0.11 restricts JavaScript from accessing local resources. Moreover, the developer recommends the following:
- Do not use
script
tag andiframe
tag inside the Markdown contents. - Do not open untrusted Markdown contents, e.g., mail attachments or donwloaded files.
Vendor Status
Vendor | Status | Last Update | Vendor Notes |
---|---|---|---|
Yuki Hattori | Vulnerable | 2017/06/28 | Yuki Hattori website |
References
JPCERT/CC Addendum
Vulnerability Analysis by JPCERT/CC
Attack Vector(AV) | Physical (P) | Local (L) | Adjacent (A) | Network (N) |
---|---|---|---|---|
Attack Complexity(AC) | High (H) | Low (L) | ||
Privileges Required(PR) | High (H) | Low (L) | None (N) | |
User Interaction(UI) | Required (R) | None (N) | ||
Scope(S) | Unchanged (U) | Changed (C) | ||
Confidentiality Impact(C) | None (N) | Low (L) | High (H) | |
Integrity Impact(I) | None (N) | Low (L) | High (H) | |
Availability Impact(A) | None (N) | Low (L) | High (H) |
Access Vector(AV) | Local (L) | Adjacent Network (A) | Network (N) |
---|---|---|---|
Access Complexity(AC) | High (H) | Medium (M) | Low (L) |
Authentication(Au) | Multiple (M) | Single (S) | None (N) |
Confidentiality Impact(C) | None (N) | Partial (P) | Complete (C) |
Integrity Impact(I) | None (N) | Partial (P) | Complete (C) |
Availability Impact(A) | None (N) | Partial (P) | Complete (C) |
Credit
Keitaro Yamazaki of Kyoto University reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
Other Information
JPCERT Alert |
|
JPCERT Reports |
|
CERT Advisory |
|
CPNI Advisory |
|
TRnotes |
|
CVE |
CVE-2017-2239 |
JVN iPedia |
JVNDB-2017-000146 |