CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
CommonMarker uses cmark-gfm
for rendering
Github Flavored Markdown.
An integer overflow in cmark-gfm
’s table row parsing
may lead to heap memory corruption when parsing tables who’s marker
rows contain more than UINT16_MAX columns. The impact of this heap
corruption ranges from Information Leak to Arbitrary Code Execution.
If affected versions of CommonMarker are used for rendering remote
user controlled markdown, this vulnerability may lead to
Remote Code Execution (RCE).
This vulnerability has been patched in the following CommonMarker release:
The vulnerability exists in the table markdown extensions of
cmark-gfm
. Disabling any use of the table extension will prevent
this vulnerability from being triggered.
We would like to thank Felix Wilhelm of Google’s Project Zero
for reporting this vulnerability
If you have any questions or comments about this advisory:
Vendor | Product | Version | CPE |
---|---|---|---|
ruby | commonmarker | * | cpe:2.3:a:ruby:commonmarker:*:*:*:*:*:*:*:* |