
Cloud Vulnerability DB
A community-led vulnerabilities database
The vulnerability (CVE-2021-33041) affects vmd software through version 1.34.0. The vulnerability allows Cross-Site Scripting (XSS) attacks via 'div class="markdown-body"', which can be exploited to achieve remote code execution through Electron on both Windows and macOS platforms. The issue was discovered and reported on May 17, 2021 (MITRE CVE, GitHub Issue).
The vulnerability stems from improper content handling in the markdown viewer. When processing markdown content, the application fails to properly sanitize user input within the 'div class="markdown-body"' element. This allows attackers to inject malicious JavaScript code that can be executed in the context of the Electron application. On Windows systems, this can be demonstrated by executing commands like require('child_process').execSync('calc.exe'), with similar attack vectors possible on macOS (GitHub Issue).
The vulnerability allows attackers to execute arbitrary code on the victim's system through the Electron application context. This means an attacker could potentially gain full control over the affected system by crafting malicious markdown files that execute arbitrary commands when opened in vmd (GitHub Issue).
The recommended mitigation is to implement proper content sanitization for user input, including HTML escaping, JavaScript escaping, CSS escaping, and URL escaping as appropriate. VMD should specifically sanitize content to prevent XSS attacks (GitHub Issue).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."