2023-07-17 16:00:28 +00:00

152 lines
5.7 KiB
JSON

{
"id": "CVE-2021-41168",
"sourceIdentifier": "security-advisories@github.com",
"published": "2021-10-21T20:15:08.417",
"lastModified": "2023-07-17T15:17:38.647",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Snudown is a reddit-specific fork of the Sundown Markdown parser used by GitHub, with Python integration added. In affected versions snudown was found to be vulnerable to denial of service attacks to its reference table implementation. References written in markdown ` [reference_name]: https://www.example.com` are inserted into a hash table which was found to have a weak hash function, meaning that an attacker can reliably generate a large number of collisions for it. This makes the hash table vulnerable to a hash-collision DoS attack, a type of algorithmic complexity attack. Further the hash table allowed for duplicate entries resulting in long retrieval times. Proofs of concept and further discussion of the hash collision issue are discussed on the snudown GHSA(https://github.com/reddit/snudown/security/advisories/GHSA-6gvv-9q92-w5f6). Users are advised to update to version 1.7.0."
},
{
"lang": "es",
"value": "Snudown es una bifurcaci\u00f3n espec\u00edfica de reddit del parser Sundown Markdown usado por GitHub, con integraci\u00f3n de Python a\u00f1adida. En las versiones afectadas se ha detectado que snudown es vulnerable a ataques de denegaci\u00f3n de servicio a su implementaci\u00f3n de tabla de referencias. Las referencias escritas en markdown \"[reference_name]: https://www.example.com\" se insertan en una tabla hash que es encontrada que presenta una funci\u00f3n hash d\u00e9bil, lo que significa que un atacante puede generar de forma fiable un gran n\u00famero de colisiones para ella. Esto hace que la tabla hash sea vulnerable a un ataque DoS de colisiones hash, un tipo de ataque de complejidad algor\u00edtmica. Adem\u00e1s, la tabla hash permit\u00eda entradas duplicadas, resultando en largos tiempos de recuperaci\u00f3n. Las pruebas de concepto y una mayor discusi\u00f3n sobre el problema de la colisi\u00f3n de hash se discuten en el snudown GHSA(https://github.com/reddit/snudown/security/advisories/GHSA-6gvv-9q92-w5f6). Se recomienda a usuarios que actualicen a la versi\u00f3n 1.7.0"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-407"
}
]
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-20"
},
{
"lang": "en",
"value": "CWE-327"
},
{
"lang": "en",
"value": "CWE-400"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:reddit:snudown:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.7.0",
"matchCriteriaId": "58C86250-D606-453F-A351-6170E69774D9"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/reddit/snudown/commit/1ac2c130b210539ee1e5d67a7bac93f9d8007c0e",
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Third Party Advisory"
]
},
{
"url": "https://github.com/reddit/snudown/security/advisories/GHSA-6gvv-9q92-w5f6",
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}