Description
HedgeDoc is a collaborative platform for writing and sharing markdown. In HedgeDoc before version 1.7.1 an attacker can inject arbitrary `script` tags in HedgeDoc notes using mermaid diagrams. Our content security policy prevents loading scripts from most locations, but `www.google-analytics.com` is allowed. Using Google Tag Manger it is possible to inject arbitrary JavaScript and execute it on page load. Depending on the configuration of the instance, the attacker may not need authentication to create or edit notes. The problem is patched in HedgeDoc 1.7.1. As a workaround one can disallow `www.google-analytics.com` in the `Content-Security-Policy` header. Note that other ways to leverage the `script` tag injection might exist.
References (5)
Core 5
Core References
Third Party Advisory x_refsource_misc
https://github.com/hedgedoc/hedgedoc/releases/tag/1.7.1
Third Party Advisory x_refsource_confirm
https://github.com/hedgedoc/hedgedoc/security/advisories/GHSA-g6w6-7xf9-m95p
Third Party Advisory x_refsource_misc
https://github.com/hackmdio/codimd/issues/1630
Exploit, Third Party Advisory x_refsource_misc
https://github.com/Alemmi/ctf-writeups/blob/main/hxpctf-2020/hackme/solution.md
Patch, Third Party Advisory x_refsource_misc
https://github.com/hedgedoc/hedgedoc/commit/58276ebbf4504a682454a3686dcaff88bc1069d4
Scores
CVSS v3
8.7
EPSS
0.0054
EPSS Percentile
67.8%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N
Details
CWE
CWE-79
Status
published
Products (1)
hedgedoc/hedgedoc
< 1.7.1
Published
Dec 29, 2020
Tracked Since
Feb 18, 2026