Lucene search

K
osvGoogleOSV:GHSA-CVR6-37GX-V8WC
HistoryMar 25, 2024 - 7:38 p.m.

KaTeX's maxExpand bypassed by Unicode sub/superscripts

2024-03-2519:38:29
Google
osv.dev
9
katex
vulnerability
patch
unicode
subscripts
superscripts
bypass
maxexpand
security issue
availability attack
memory overflow
stack overflow
upgrade
workaround
macro execution limit
security advisory
software

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

AI Score

7.3

Confidence

High

EPSS

0

Percentile

9.0%

Impact

KaTeX users who render untrusted mathematical expressions could encounter malicious input using \def or \newcommand that causes a near-infinite loop, despite setting maxExpand to avoid such loops. This can be used as an availability attack, where e.g. a client rendering another user’s KaTeX input will be unable to use the site due to memory overflow, tying up the main thread, or stack overflow.

Patches

Upgrade to KaTeX v0.16.10 to remove this vulnerability.

Workarounds

Forbid inputs containing any of the characters β‚Šβ‚‹β‚Œβ‚β‚Žβ‚€β‚β‚‚β‚ƒβ‚„β‚…β‚†β‚‡β‚ˆβ‚‰β‚β‚‘β‚•α΅’β±Όβ‚–β‚—β‚˜β‚™β‚’β‚šα΅£β‚›β‚œα΅€α΅₯ₓᡦᡧᡨᡩα΅ͺβΊβ»βΌβ½βΎβ°ΒΉΒ²Β³β΄β΅βΆβ·βΈβΉα΅ƒα΅‡αΆœα΅ˆα΅‰α΅Κ°β±Κ²α΅Λ‘α΅βΏα΅’α΅–Κ³Λ’α΅—α΅˜Κ·Λ£ΚΈαΆ»α΅›α΅α΅žα΅Ÿα΅ α΅‘ before passing them to KaTeX.
(There is no easy workaround for the auto-render extension.)

Details

KaTeX supports an option named maxExpand which aims to prevent infinitely recursive macros from consuming all available memory and/or triggering a stack overflow error. Unfortunately, support for β€œUnicode (sub|super)script characters” allows an attacker to bypass this limit. Each sub/superscript group instantiated a separate Parser with its own limit on macro executions, without inheriting the current count of macro executions from its parent. This has been corrected in KaTeX v0.16.10.

For more information

If you have any questions or comments about this advisory:

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

AI Score

7.3

Confidence

High

EPSS

0

Percentile

9.0%