CVE-2019-25103 – simple-markdown
Package
Manager: npm
Name: simple-markdown
Vulnerable Version: >=0 <0.5.2
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
EPSS: 0.00043 pctl0.12418
Details
Regular Expression Denial of Service in simple-markdown A vulnerability has been found in simple-markdown 0.5.1 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file simple-markdown.js. The manipulation leads to inefficient regular expression complexity. The attack can be launched remotely. Upgrading to version 0.5.2 is able to address this issue. The name of the patch is 89797fef9abb4cab2fb76a335968266a92588816. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-220639.
Metadata
Created: 2023-02-12T15:30:24Z
Modified: 2023-02-24T16:01:14Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/02/GHSA-gpvj-gp8c-c7p2/GHSA-gpvj-gp8c-c7p2.json
CWE IDs: ["CWE-1333"]
Alternative ID: GHSA-gpvj-gp8c-c7p2
Finding: F211
Auto approve: 1