Lucene search

K
cveVulnCheckCVE-2024-22051
HistoryJan 04, 2024 - 9:15 p.m.

CVE-2024-22051

2024-01-0421:15:10
CWE-190
VulnCheck
web.nvd.nist.gov
28
commonmarker
cve-2024-22051
integer overflow
remote code execution
memory corruption
information leak
nvd

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

9.6

Confidence

High

EPSS

0.004

Percentile

74.4%

CommonMarker versions prior to 0.23.4 are at risk of an integer overflow vulnerability. This vulnerability can result in possibly unauthenticated remote attackers to cause heap memory corruption, potentially leading to an information leak or remote code execution, via parsing tables with marker rows that contain more than UINT16_MAX columns.

Affected configurations

Nvd
Node
githubcmark-gfmRange<0.28.3.gfm.21
OR
githubcmark-gfmRange0.29.0.gfm.00.29.0.gfm.3
OR
gjtorikiancommonmarkerRange<0.23.4ruby
VendorProductVersionCPE
githubcmark-gfm*cpe:2.3:a:github:cmark-gfm:*:*:*:*:*:*:*:*
gjtorikiancommonmarker*cpe:2.3:a:gjtorikian:commonmarker:*:*:*:*:*:ruby:*:*

CNA Affected

[
  {
    "collectionURL": "https://rubygems.org",
    "defaultStatus": "unaffected",
    "packageName": "commonmarker",
    "versions": [
      {
        "lessThan": "0.23.4",
        "status": "affected",
        "version": "0",
        "versionType": "semver"
      }
    ]
  }
]

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

9.6

Confidence

High

EPSS

0.004

Percentile

74.4%