org.webjars.bowergithub.katex:katex@0.12.0 vulnerabilities

  • latest version

    0.12.0

  • first published

    5 years ago

  • latest version published

    3 years ago

  • licenses detected

  • package manager

Direct Vulnerabilities

Known vulnerabilities in the org.webjars.bowergithub.katex:katex package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • M
Unchecked Input for Loop Condition

org.webjars.bowergithub.katex:katex is a Fast math typesetting for the web.

Affected versions of this package are vulnerable to Unchecked Input for Loop Condition when handling \edef commands. An attacker can cause a near-infinite loop, leading to memory overflow, tying up the main thread, or stack overflow by crafting malicious input using \edef that bypasses the maxExpand setting designed to prevent such issues.

Note:

This vulnerability is particularly concerning for users who render untrusted mathematical expressions, as it can be exploited to perform an availability attack, rendering the service unusable.

How to fix Unchecked Input for Loop Condition?

A fix was pushed into the master branch but not yet published.

[0,)
  • M
Incomplete List of Disallowed Inputs

org.webjars.bowergithub.katex:katex is a Fast math typesetting for the web.

Affected versions of this package are vulnerable to Incomplete List of Disallowed Inputs due to the trust option. Specifically, the functionality that provides a function to blacklist certain URL protocols, can be bypassed by URLs in malicious inputs that utilize uppercase characters in the protocol. This can allow for the generation of javascript: links in the output, even when the trust function is designed to forbid this protocol.

How to fix Incomplete List of Disallowed Inputs?

A fix was pushed into the master branch but not yet published.

[0,)
  • M
Improper Encoding or Escaping of Output

org.webjars.bowergithub.katex:katex is a Fast math typesetting for the web.

Affected versions of this package are vulnerable to Improper Encoding or Escaping of Output when handling the \includegraphics command. An attacker can execute arbitrary JavaScript or generate invalid HTML by exploiting the lack of proper filename escaping in the \includegraphics command.

Note:

This is only exploitable if the trust option is enabled or not properly configured to restrict the \includegraphics commands.

How to fix Improper Encoding or Escaping of Output?

A fix was pushed into the master branch but not yet published.

[0,)