
Cloud Vulnerability DB
A community-led vulnerabilities database
Mark Text v0.16.3 was discovered to contain a DOM-based cross-site scripting (XSS) vulnerability which allows attackers to perform remote code execution (RCE). The vulnerability was discovered and reported on February 7, 2022, and affects the HTML paste functionality in the application, specifically within the /lib/contentState/pasteCtrl.js component (GitHub Issue, CVE MITRE).
The vulnerability exists in the HTML paste functionality where the application fails to properly sanitize HTML content before inserting it into the DOM. The issue specifically occurs in the checkCopyType function within pasteCtrl.js, which only performs basic checks to determine if the content is wrapped in HTML tags without implementing proper sanitization. This allows attackers to inject malicious code that can be executed through inline scripts, potentially leading to remote code execution by calling child_process (GitHub Issue).
The vulnerability allows attackers to execute arbitrary code remotely on the victim's system through malicious HTML content. When exploited, an attacker could gain control over the affected system by inducing users to copy and paste specially crafted HTML code into the Mark Text application (GitHub Issue).
The vulnerability was fixed through a pull request that implemented proper HTML sanitization for table paste content. The fix was merged on February 18, 2022, and users are advised to update to versions after v0.16.3 (GitHub PR).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."