Lucene search

K
osvGoogleOSV:GHSA-RRRM-QJM4-V8HF
HistoryJan 14, 2022 - 9:04 p.m.

Inefficient Regular Expression Complexity in marked

2022-01-1421:04:41
Google
osv.dev
20
marked
vulnerability
denial of service
patch
upgrade
workaround
regex
backtracking
worker
time limit
resources
untrusted markdown
dos
redos
owasp

EPSS

0.004

Percentile

72.4%

Impact

What kind of vulnerability is it?

Denial of service.

The regular expression block.def may cause catastrophic backtracking against some strings.
PoC is the following.

import * as marked from "marked";

marked.parse(`[x]:${' '.repeat(1500)}x ${' '.repeat(1500)} x`);

Who is impacted?

Anyone who runs untrusted markdown through marked and does not use a worker with a time limit.

Patches

Has the problem been patched?

Yes

What versions should users upgrade to?

4.0.10

Workarounds

Is there a way for users to fix or remediate the vulnerability without upgrading?

Do not run untrusted markdown through marked or run marked on a worker thread and set a reasonable time limit to prevent draining resources.

References

Are there any links users can visit to find out more?

For more information

If you have any questions or comments about this advisory: