9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
0.001 Low
EPSS
Percentile
32.6%
gatsby-plugin-mdx is vulnerable to deserialization of untrusted data. The vulnerability exists when passing input into grey-matter because the default configuration doesn’t properly sanitize the input which allows an attacker to bypass and inject untrusted input into MDX files.
CPE | Name | Operator | Version |
---|---|---|---|
gatsby-plugin-mdx | le | 2.14.0 | |
gatsby-plugin-mdx | le | 3.15.1 | |
gatsby-plugin-mdx | le | 2.14.0 | |
gatsby-plugin-mdx | le | 3.15.1 |
drive.google.com/file/d/1EoCzbwTWOM8-fjvwMbH3bqcZ2iKksxTW/view?usp=sharing
github.com/advisories/GHSA-mj46-r4gr-5x83
github.com/gatsbyjs/gatsby/commit/b3690fbb70cc4470f6f17595f59d83146a443ffb
github.com/gatsbyjs/gatsby/pull/35830
github.com/gatsbyjs/gatsby/pull/35830/commits/f214eb0694c61e348b2751cecd1aace2046bc46e
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
0.001 Low
EPSS
Percentile
32.6%