Описание
markdown2 >=1.0.1.18, fixed in 2.4.0, is affected by a regular expression denial of service vulnerability. If an attacker provides a malicious string, it can make markdown2 processing difficult or delayed for an extended period of time.
Ссылки
- ExploitThird Party Advisory
- ExploitThird Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия от 1.0.1.18 (включая) до 2.4.0 (исключая)
cpe:2.3:a:markdown2_project:markdown2:*:*:*:*:*:*:*:*
Конфигурация 2
Одно из
cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*
EPSS
Процентиль: 64%
0.00478
Низкий
7.5 High
CVSS3
5 Medium
CVSS2
Дефекты
CWE-1333
Связанные уязвимости
CVSS3: 7.5
ubuntu
почти 5 лет назад
markdown2 >=1.0.1.18, fixed in 2.4.0, is affected by a regular expression denial of service vulnerability. If an attacker provides a malicious string, it can make markdown2 processing difficult or delayed for an extended period of time.
CVSS3: 7.5
debian
почти 5 лет назад
markdown2 >=1.0.1.18, fixed in 2.4.0, is affected by a regular express ...
EPSS
Процентиль: 64%
0.00478
Низкий
7.5 High
CVSS3
5 Medium
CVSS2
Дефекты
CWE-1333