-
-
Notifications
You must be signed in to change notification settings - Fork 0
chore(deps): update dependency katex to v0.16.21 [security] #227
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
Conversation
Reviewer's Guide by SourceryThis PR updates the katex dependency from version 0.16.11 to 0.16.21 to address a security vulnerability. The vulnerability allows malicious input using \htmlData to run arbitrary JavaScript or generate invalid HTML. This update includes bug fixes and new features as well. Sequence diagram showing KaTeX vulnerability with \htmlData commandsequenceDiagram
actor User
participant App
participant KaTeX
participant HTML
Note over User,HTML: Before patch (v0.16.11)
User->>App: Input math with malicious \htmlData
App->>KaTeX: renderToString(input, {trust: true})
KaTeX->>HTML: Generate HTML without validation
HTML-->>User: Executes malicious JavaScript
Note over User,HTML: After patch (v0.16.21)
User->>App: Input math with malicious \htmlData
App->>KaTeX: renderToString(input, {trust: true})
KaTeX->>KaTeX: Validate attribute name
KaTeX->>HTML: Generate safe HTML
HTML-->>User: Renders math safely
Flow diagram of KaTeX security fixflowchart TD
A[Math Input] --> B{Contains \htmlData?}
B -->|Yes| C{v0.16.21+?}
B -->|No| D[Process Normally]
C -->|Yes| E[Validate Attribute Name]
C -->|No| F[Potential XSS Risk]
E --> G[Generate Safe HTML]
F --> H[Vulnerable to XSS]
G --> I[Safe Output]
H --> J[Unsafe Output]
D --> I
File-Level Changes
Tips and commandsInteracting with Sourcery
Customizing Your ExperienceAccess your dashboard to:
Getting Help
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
We have skipped reviewing this pull request. It seems to have been created by a bot (hey, renovate[bot]!). We assume it knows what it's doing!
🦙 MegaLinter status: ❌ ERROR
See detailed report in MegaLinter reports You could have the same capabilities but better runtime performances if you use a MegaLinter flavor:
|
2a4dd98
to
ca4d3bf
Compare
ca4d3bf
to
10f045e
Compare
10f045e
to
f12dd6c
Compare
f12dd6c
to
b5e182f
Compare
This PR contains the following updates:
0.16.11
->0.16.21
GitHub Vulnerability Alerts
CVE-2025-23207
Impact
KaTeX users who render untrusted mathematical expressions with
renderToString
could encounter malicious input using\htmlData
that runs arbitrary JavaScript, or generate invalid HTML.Patches
Upgrade to KaTeX v0.16.21 to remove this vulnerability.
Workarounds
trust
option, or set it to forbid\htmlData
commands."\\htmlData"
.Details
\htmlData
did not validate its attribute name argument, allowing it to generate invalid or malicious HTML that runs scripts.For more information
If you have any questions or comments about this advisory:
Release Notes
KaTeX/KaTeX (katex)
v0.16.21
Compare Source
Bug Fixes
v0.16.20
Compare Source
Bug Fixes
v0.16.19
Compare Source
Bug Fixes
strict
function type (#4009) (4228b4e)v0.16.18
Compare Source
Bug Fixes
v0.16.17
Compare Source
Bug Fixes
v0.16.16
Compare Source
Features
v0.16.15
Compare Source
Features
\mathsfit
command (#3998) (2218901)v0.16.14
Compare Source
Features
v0.16.13
Compare Source
Bug Fixes
\vdots
and\rule
support in text mode (#3997) (0e08352), closes #3990v0.16.12
Compare Source
Features
Configuration
📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).
🚦 Automerge: Enabled.
♻ Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR was generated by Mend Renovate. View the repository job log.