CodiMD through 2.2.0 has a CSP-based protection mechanism against XSS through uploaded JavaScript content, but it can be bypassed by uploading a .html file that references an uploaded .js file.
The product does not sufficiently protect all possible paths that a user can take to access restricted functionality or resources.
Link | Tags |
---|---|
https://github.com/hackmdio/codimd/issues/1910 | exploit issue tracking |
https://github.com/zast-ai/vulnerability-reports/blob/main/formidable/file_upload/report.md | third party advisory exploit |