Lucene search

K
githubGitHub Advisory DatabaseGHSA-J5P7-JF4Q-742Q
HistoryDec 27, 2022 - 9:30 a.m.

markdown-it vulnerable to Inefficient Regular Expression Complexity

2022-12-2709:30:41
CWE-1333
GitHub Advisory Database
github.com
16
markdown-it
vulnerability
html
regular expression
complexity
upgrade
patch
vdb-216852
software

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

EPSS

0.002

Percentile

52.3%

A vulnerability was found in markdown-it up to 2.x. It has been classified as problematic. Affected is an unknown function of the file lib/common/html_re.js. The manipulation leads to inefficient regular expression complexity. Upgrading to version 3.0.0 is able to address this issue. The name of the patch is 89c8620157d6e38f9872811620d25138fc9d1b0d. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-216852.

Affected configurations

Vulners
Node
markdown-it_projectmarkdown-itRange<3.0.0
VendorProductVersionCPE
markdown-it_projectmarkdown-it*cpe:2.3:a:markdown-it_project:markdown-it:*:*:*:*:*:*:*:*

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

EPSS

0.002

Percentile

52.3%

Related for GHSA-J5P7-JF4Q-742Q