Regular Expression Denial of Service (ReDoS) Affecting marked package, versions [,0.3.4)


0.0
high
  • Attack Complexity

    Low

  • Availability

    High

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • snyk-id

    SNYK-DOTNET-MARKED-60182

  • published

    6 Nov 2015

  • disclosed

    6 Nov 2015

  • credit

    Barış Soner Uşaklı

How to fix?

Ugrade to marked v0.3.4 or later.

Overview

Marked 0.3.3 and earlier is vulnerable to regular expression denial of service (ReDoS) when certain types of input are passed in to be parsed.

Source: Node Security Project

Details

"The Regular expression Denial of Service (ReDoS) is a Denial of Service attack, that exploits the fact that most Regular Expression implementations may reach extreme situations that cause them to work very slowly (exponentially related to input size). An attacker can then cause a program using a Regular Expression to enter these extreme situations and then hang for a very long time." [1]

Marked's catastrophic backtracking issue for the em inline rule has now been patched in 0.3.4.