GHSA-j533-2g8v-pmpg

Suggest an improvement
Source
https://github.com/advisories/GHSA-j533-2g8v-pmpg
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/02/GHSA-j533-2g8v-pmpg/GHSA-j533-2g8v-pmpg.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-j533-2g8v-pmpg
Aliases
Published
2023-02-12T15:30:25Z
Modified
2023-11-08T04:01:33.550945Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
Regular Expression Denial of Service in simple-markdown
Details

A vulnerability, which was classified as problematic, was found in simple-markdown 0.6.0. Affected is an unknown function of the file simple-markdown.js. The manipulation with the input <<<<<<<<<<:/:/:/:/:/:/:/:/:/:/ leads to inefficient regular expression complexity. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 0.6.1 is able to address this issue. The name of the patch is 015a719bf5cdc561feea05500ecb3274ef609cd2. It is recommended to upgrade the affected component. VDB-220638 is the identifier assigned to this vulnerability.

Database specific
{
    "nvd_published_at": "2023-02-12T14:15:00Z",
    "github_reviewed_at": "2023-02-14T00:57:45Z",
    "severity": "HIGH",
    "github_reviewed": true,
    "cwe_ids": [
        "CWE-1333"
    ]
}
References

Affected packages

npm / simple-markdown

Package

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.6.1