Description
marked is an application that is meant to parse and compile markdown. Due to the way that marked 0.3.5 and earlier parses input, specifically HTML entities, it's possible to bypass marked's content injection protection (`sanitize: true`) to inject a `javascript:` URL. This flaw exists because `NNanything;` gets parsed to what it could and leaves the rest behind, resulting in just `anything;` being left.
Remediation
References
https://nodesecurity.io/advisories/101
https://github.com/chjj/marked/pull/592/commits/2cff85979be8e7a026a9aca35542c470cf5da523
https://github.com/chjj/marked/pull/592
Related Vulnerabilities
CVE-2017-1000427 Vulnerability in maven package org.webjars.bower:marked
CVE-2020-7757 Vulnerability in npm package droppy
CVE-2018-16487 Vulnerability in npm package lodash
CVE-2017-3523 Vulnerability in maven package mysql:mysql-connector-java
CVE-2021-23358 Vulnerability in maven package org.webjars.bowergithub.jashkenas:underscore