org.webjars.bowergithub.markdown-it:markdown-it@8.4.1 vulnerabilities

  • latest version

    10.0.0

  • first published

    6 years ago

  • latest version published

    4 years ago

  • licenses detected

  • package manager

Direct Vulnerabilities

Known vulnerabilities in the org.webjars.bowergithub.markdown-it:markdown-it package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • H
Infinite loop

org.webjars.bowergithub.markdown-it:markdown-it is a modern pluggable markdown parser.

Affected versions of this package are vulnerable to Infinite loop in linkify inline rule when using malformed input.

How to fix Infinite loop?

A fix was pushed into the master branch but not yet published.

[0,)
  • M
Regular Expression Denial of Service (ReDoS)

org.webjars.bowergithub.markdown-it:markdown-it is a modern pluggable markdown parser.

Affected versions of this package are vulnerable to Regular Expression Denial of Service (ReDoS) via the /s+$/ in line 23 of lib/rules_inline/newline.js. This expression is used to remove trailing whitespaces from a string, however, it also matches non-trailing whitespaces. In the worst-case scenario, the matching process would take computation time proportional to the square of the length of the non-trailing whitespaces. It is possible that a string containing more than tens of thousands characters, as markdown-it handles Markdown, would be passed over the network, resulting in significant computational time.

How to fix Regular Expression Denial of Service (ReDoS)?

There is no fixed version for org.webjars.bowergithub.markdown-it:markdown-it.

[0,)
  • M
Regular Expression Denial of Service (ReDoS)

org.webjars.bowergithub.markdown-it:markdown-it is a modern pluggable markdown parser.

Affected versions of this package are vulnerable to Regular Expression Denial of Service (ReDoS). Parsing __*_… takes quadratic time, this could be a denial of service vulnerability in an application that parses user input.

How to fix Regular Expression Denial of Service (ReDoS)?

There is no fixed version for org.webjars.bowergithub.markdown-it:markdown-it.

[0,)