### Reachability Analysis
This vulnerability is potentially reachable
```
owasp-nodejs-goat-1.3.0/server.js (Application)
-> ❌ marked-0.3.9/lib/marked.js (Vulnerable Component)
```
### Vulnerability Details
Marked is a markdown parser and compiler. Prior to version 4.0.10, the regular expression `inline.reflinkSearch` may cause catastrophic backtracking against some strings and lead to a denial of service (DoS). Anyone who runs untrusted markdown through a vulnerable version of marked and does not use a worker with a time limit may be affected. This issue is patched in version 4.0.10. As a workaround, avoid running untrusted markdown through marked or run marked on a worker thread and set a reasonable time limit to prevent draining resources.
### Reachability Analysis
This vulnerability is potentially reachable
```
owasp-nodejs-goat-1.3.0/server.js (Application)
-> ❌ marked-0.3.9/lib/marked.js (Vulnerable Component)
```
### Vulnerability Details
Marked is a markdown parser and compiler. Prior to version 4.0.10, the regular expression `block.def` may cause catastrophic backtracking against some strings and lead to a regular expression denial of service (ReDoS). Anyone who runs untrusted markdown through a vulnerable version of marked and does not use a worker with a time limit may be affected. This issue is patched in version 4.0.10. As a workaround, avoid running untrusted markdown through marked or run marked on a worker thread and set a reasonable time limit to prevent draining resources.
### Reachability Analysis
This vulnerability is potentially reachable
```
owasp-nodejs-goat-1.3.0/server.js (Application)
-> ❌ marked-0.3.9/lib/marked.js (Vulnerable Component)
```
### Vulnerability Details
marked before 1.1.1 is vulnerable to Regular Expression Denial of Service (REDoS). rules.js have multiple unused capture groups which can lead to a Denial of Service.
### Reachability Analysis
This vulnerability is potentially reachable
```
owasp-nodejs-goat-1.3.0/server.js (Application)
-> ❌ marked-0.3.9/lib/marked.js (Vulnerable Component)
```
### Vulnerability Details
Versions 0.3.17 and earlier of marked has Four regexes were vulnerable to catastrophic backtracking. This leaves markdown servers open to a potential REDOS attack.
Vulnerable Library - marked-0.3.9.tgz
A markdown parser built for speed
Library home page: https://registry.npmjs.org/marked/-/marked-0.3.9.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/marked/package.json
Found in HEAD commit: 0f560909b2ffd6ef4ef6430245d20517f6f55a06
Vulnerabilities
Reachable
Reachable
Reachable
Reachable
Reachable
**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation
Details
CVE-2022-21681
### Vulnerable Library - marked-0.3.9.tgzA markdown parser built for speed
Library home page: https://registry.npmjs.org/marked/-/marked-0.3.9.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/marked/package.json
Dependency Hierarchy: - :x: **marked-0.3.9.tgz** (Vulnerable Library)
Found in HEAD commit: 0f560909b2ffd6ef4ef6430245d20517f6f55a06
Found in base branch: master
### Reachability Analysis This vulnerability is potentially reachable ``` owasp-nodejs-goat-1.3.0/server.js (Application) -> ❌ marked-0.3.9/lib/marked.js (Vulnerable Component) ``` ### Vulnerability DetailsMarked is a markdown parser and compiler. Prior to version 4.0.10, the regular expression `inline.reflinkSearch` may cause catastrophic backtracking against some strings and lead to a denial of service (DoS). Anyone who runs untrusted markdown through a vulnerable version of marked and does not use a worker with a time limit may be affected. This issue is patched in version 4.0.10. As a workaround, avoid running untrusted markdown through marked or run marked on a worker thread and set a reasonable time limit to prevent draining resources.
Publish Date: 2022-01-14
URL: CVE-2022-21681
### Threat AssessmentExploit Maturity: Not Defined
EPSS: 0.2%
### CVSS 3 Score Details (7.5)Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High
For more information on CVSS3 Scores, click here. ### Suggested FixType: Upgrade version
Origin: https://github.com/advisories/GHSA-5v2h-r2cx-5xgj
Release Date: 2022-01-14
Fix Resolution: 4.0.10
:rescue_worker_helmet: Automatic Remediation will be attempted for this issue.CVE-2022-21680
### Vulnerable Library - marked-0.3.9.tgzA markdown parser built for speed
Library home page: https://registry.npmjs.org/marked/-/marked-0.3.9.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/marked/package.json
Dependency Hierarchy: - :x: **marked-0.3.9.tgz** (Vulnerable Library)
Found in HEAD commit: 0f560909b2ffd6ef4ef6430245d20517f6f55a06
Found in base branch: master
### Reachability Analysis This vulnerability is potentially reachable ``` owasp-nodejs-goat-1.3.0/server.js (Application) -> ❌ marked-0.3.9/lib/marked.js (Vulnerable Component) ``` ### Vulnerability DetailsMarked is a markdown parser and compiler. Prior to version 4.0.10, the regular expression `block.def` may cause catastrophic backtracking against some strings and lead to a regular expression denial of service (ReDoS). Anyone who runs untrusted markdown through a vulnerable version of marked and does not use a worker with a time limit may be affected. This issue is patched in version 4.0.10. As a workaround, avoid running untrusted markdown through marked or run marked on a worker thread and set a reasonable time limit to prevent draining resources.
Publish Date: 2022-01-14
URL: CVE-2022-21680
### Threat AssessmentExploit Maturity: Not Defined
EPSS: 0.4%
### CVSS 3 Score Details (7.5)Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High
For more information on CVSS3 Scores, click here. ### Suggested FixType: Upgrade version
Origin: https://github.com/advisories/GHSA-rrrm-qjm4-v8hf
Release Date: 2022-01-14
Fix Resolution: 4.0.10
:rescue_worker_helmet: Automatic Remediation will be attempted for this issue.WS-2020-0163
### Vulnerable Library - marked-0.3.9.tgzA markdown parser built for speed
Library home page: https://registry.npmjs.org/marked/-/marked-0.3.9.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/marked/package.json
Dependency Hierarchy: - :x: **marked-0.3.9.tgz** (Vulnerable Library)
Found in HEAD commit: 0f560909b2ffd6ef4ef6430245d20517f6f55a06
Found in base branch: master
### Reachability Analysis This vulnerability is potentially reachable ``` owasp-nodejs-goat-1.3.0/server.js (Application) -> ❌ marked-0.3.9/lib/marked.js (Vulnerable Component) ``` ### Vulnerability Detailsmarked before 1.1.1 is vulnerable to Regular Expression Denial of Service (REDoS). rules.js have multiple unused capture groups which can lead to a Denial of Service.
Publish Date: 2020-07-02
URL: WS-2020-0163
### Threat AssessmentExploit Maturity: Not Defined
EPSS:
### CVSS 3 Score Details (5.9)Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High
For more information on CVSS3 Scores, click here. ### Suggested FixType: Upgrade version
Release Date: 2020-07-02
Fix Resolution: 1.1.1
:rescue_worker_helmet: Automatic Remediation will be attempted for this issue.WS-2019-0027
### Vulnerable Library - marked-0.3.9.tgzA markdown parser built for speed
Library home page: https://registry.npmjs.org/marked/-/marked-0.3.9.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/marked/package.json
Dependency Hierarchy: - :x: **marked-0.3.9.tgz** (Vulnerable Library)
Found in HEAD commit: 0f560909b2ffd6ef4ef6430245d20517f6f55a06
Found in base branch: master
### Reachability Analysis This vulnerability is potentially reachable ``` owasp-nodejs-goat-1.3.0/server.js (Application) -> ❌ marked-0.3.9/lib/marked.js (Vulnerable Component) ``` ### Vulnerability DetailsVersions 0.3.17 and earlier of marked has Four regexes were vulnerable to catastrophic backtracking. This leaves markdown servers open to a potential REDOS attack.
Publish Date: 2018-02-26
URL: WS-2019-0027
### Threat AssessmentExploit Maturity: Not Defined
EPSS:
### CVSS 3 Score Details (5.3)Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: Low
For more information on CVSS3 Scores, click here. ### Suggested FixType: Upgrade version
Release Date: 2018-02-26
Fix Resolution: 0.3.18
:rescue_worker_helmet: Automatic Remediation will be attempted for this issue.WS-2018-0628
### Vulnerable Library - marked-0.3.9.tgzA markdown parser built for speed
Library home page: https://registry.npmjs.org/marked/-/marked-0.3.9.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/marked/package.json
Dependency Hierarchy: - :x: **marked-0.3.9.tgz** (Vulnerable Library)
Found in HEAD commit: 0f560909b2ffd6ef4ef6430245d20517f6f55a06
Found in base branch: master
### Reachability Analysis This vulnerability is potentially reachable ``` owasp-nodejs-goat-1.3.0/server.js (Application) -> ❌ marked-0.3.9/lib/marked.js (Vulnerable Component) ``` ### Vulnerability Detailsmarked before 0.4.0 is vulnerable to Regular Expression Denial of Service (REDoS) through heading in marked.js.
Publish Date: 2018-04-16
URL: WS-2018-0628
### Threat AssessmentExploit Maturity: Not Defined
EPSS:
### CVSS 3 Score Details (5.3)Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: Low
For more information on CVSS3 Scores, click here. ### Suggested FixType: Upgrade version
Release Date: 2018-04-16
Fix Resolution: 0.4.0
:rescue_worker_helmet: Automatic Remediation will be attempted for this issue.:rescue_worker_helmet:Automatic Remediation will be attempted for this issue.