CVE-2022-41709:
Markdownify subject to Remote Code Execution via malicious markdown file
7.8
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.11061%
CWE
-
Published
10/19/2022
Updated
1/30/2023
KEV Status
No
Technology
JavaScript
Technical Details
CVSS Vector
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
electron-markdownify | npm | <= 1.4.1 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems directly from enabling nodeIntegration
in Electron's BrowserWindow
configuration. This setting allows the renderer process
to access Node.js
APIs, which when combined with untrusted content rendering (markdown files), enables RCE through constructs like require('child_process').exec()
. The main.js
file is Electron's main process entry point where window configuration typically occurs. While no specific function
names are provided in available sources, the BrowserWindow
instantiation with insecure settings is the root cause.