Markdownify version 1.4.1 allows an external attacker to execute arbitrary code remotely on any client attempting to view a malicious markdown file through Markdownify. This is possible because the application has the "nodeIntegration" option enabled.
The product imports, requires, or includes executable functionality (such as a library) from a source that is outside of the intended control sphere.
Link | Tags |
---|---|
https://fluidattacks.com/advisories/adams/ | third party advisory exploit |
https://github.com/amitmerchant1990/electron-markdownify | third party advisory |