cve/2023/CVE-2023-24824.md
2024-06-18 02:51:15 +02:00

19 lines
1.2 KiB
Markdown

### [CVE-2023-24824](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24824)
![](https://img.shields.io/static/v1?label=Product&message=cmark-gfm&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20%3C%200.29.0.gfm.10%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-400%3A%20Uncontrolled%20Resource%20Consumption&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-407%3A%20Inefficient%20Algorithmic%20Complexity&color=brighgreen)
### Description
cmark-gfm is GitHub's fork of cmark, a CommonMark parsing and rendering library and program in C. A polynomial time complexity issue in cmark-gfm may lead to unbounded resource exhaustion and subsequent denial of service. This CVE covers quadratic complexity issues when parsing text which leads with either large numbers of `>` or `-` characters. This issue has been addressed in version 0.29.0.gfm.10. Users are advised to upgrade. Users unable to upgrade should validate that their input comes from trusted sources.
### POC
#### Reference
- https://github.com/github/cmark-gfm/security/advisories/GHSA-66g8-4hjf-77xh
#### Github
No PoCs found on GitHub currently.