CVE-2024-28244 Affecting node-katex package, versions *


Severity

Recommended
low

Based on Debian security rating.

Threat Intelligence

EPSS
0.04% (12th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DEBIAN12-NODEKATEX-6483743
  • published26 Mar 2024
  • disclosed25 Mar 2024

Introduced: 25 Mar 2024

CVE-2024-28244  (opens in a new tab)

How to fix?

There is no fixed version for Debian:12 node-katex.

NVD Description

Note: Versions mentioned in the description apply only to the upstream node-katex package and not the node-katex package as distributed by Debian. See How to fix? for Debian:12 relevant fixed versions and status.

KaTeX is a JavaScript library for TeX math rendering on the web. KaTeX users who render untrusted mathematical expressions could encounter malicious input using \def or \newcommand that causes a near-infinite loop, despite setting maxExpand to avoid such loops. KaTeX supports an option named maxExpand which aims to prevent infinitely recursive macros from consuming all available memory and/or triggering a stack overflow error. Unfortunately, support for "Unicode (sub|super)script characters" allows an attacker to bypass this limit. Each sub/superscript group instantiated a separate Parser with its own limit on macro executions, without inheriting the current count of macro executions from its parent. This has been corrected in KaTeX v0.16.10.