Lucene search

K
cvelistGitHub_MCVELIST:CVE-2021-41168
HistoryOct 21, 2021 - 8:10 p.m.

CVE-2021-41168 Hash-Collision Denial-of-Service Vulnerability in snudown

2021-10-2120:10:12
CWE-400
CWE-20
CWE-327
GitHub_M
www.cve.org
2
cve-2021-41168
hash-collision
denial-of-service
vulnerability
snudown
github
python
update
reference table

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

EPSS

0.001

Percentile

30.5%

Snudown is a reddit-specific fork of the Sundown Markdown parser used by GitHub, with Python integration added. In affected versions snudown was found to be vulnerable to denial of service attacks to its reference table implementation. References written in markdown [reference_name]: https://www.example.com are inserted into a hash table which was found to have a weak hash function, meaning that an attacker can reliably generate a large number of collisions for it. This makes the hash table vulnerable to a hash-collision DoS attack, a type of algorithmic complexity attack. Further the hash table allowed for duplicate entries resulting in long retrieval times. Proofs of concept and further discussion of the hash collision issue are discussed on the snudown GHSA(https://github.com/reddit/snudown/security/advisories/GHSA-6gvv-9q92-w5f6). Users are advised to update to version 1.7.0.

CNA Affected

[
  {
    "product": "snudown",
    "vendor": "reddit",
    "versions": [
      {
        "status": "affected",
        "version": "< 1.7.0"
      }
    ]
  }
]

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

EPSS

0.001

Percentile

30.5%

Related for CVELIST:CVE-2021-41168