DimaMend / NodeGoat

Apache License 2.0
0 stars 11 forks source link

marked-0.3.9.tgz: 5 vulnerabilities (highest severity is: 7.5) reachable #6

Open mend-for-github-com[bot] opened 10 months ago

mend-for-github-com[bot] commented 10 months ago
Vulnerable Library - marked-0.3.9.tgz

A markdown parser built for speed

Library home page: https://registry.npmjs.org/marked/-/marked-0.3.9.tgz

Path to dependency file: /package.json

Path to vulnerable library: /node_modules/marked/package.json

Found in HEAD commit: 0f560909b2ffd6ef4ef6430245d20517f6f55a06

Vulnerabilities

CVE Severity CVSS Exploit Maturity EPSS Dependency Type Fixed in (marked version) Remediation Possible** Reachability
CVE-2022-21681 High 7.5 Not Defined 0.2% marked-0.3.9.tgz Direct 4.0.10

Reachable

CVE-2022-21680 High 7.5 Not Defined 0.4% marked-0.3.9.tgz Direct 4.0.10

Reachable

WS-2020-0163 Medium 5.9 Not Defined marked-0.3.9.tgz Direct 1.1.1

Reachable

WS-2019-0027 Medium 5.3 Not Defined marked-0.3.9.tgz Direct 0.3.18

Reachable

WS-2018-0628 Medium 5.3 Not Defined marked-0.3.9.tgz Direct 0.4.0

Reachable

**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation

Details

CVE-2022-21681 ### Vulnerable Library - marked-0.3.9.tgz

A markdown parser built for speed

Library home page: https://registry.npmjs.org/marked/-/marked-0.3.9.tgz

Path to dependency file: /package.json

Path to vulnerable library: /node_modules/marked/package.json

Dependency Hierarchy: - :x: **marked-0.3.9.tgz** (Vulnerable Library)

Found in HEAD commit: 0f560909b2ffd6ef4ef6430245d20517f6f55a06

Found in base branch: master

### Reachability Analysis This vulnerability is potentially reachable ``` owasp-nodejs-goat-1.3.0/server.js (Application) -> ❌ marked-0.3.9/lib/marked.js (Vulnerable Component) ```

### Vulnerability Details

Marked is a markdown parser and compiler. Prior to version 4.0.10, the regular expression `inline.reflinkSearch` may cause catastrophic backtracking against some strings and lead to a denial of service (DoS). Anyone who runs untrusted markdown through a vulnerable version of marked and does not use a worker with a time limit may be affected. This issue is patched in version 4.0.10. As a workaround, avoid running untrusted markdown through marked or run marked on a worker thread and set a reasonable time limit to prevent draining resources.

Publish Date: 2022-01-14

URL: CVE-2022-21681

### Threat Assessment

Exploit Maturity: Not Defined

EPSS: 0.2%

### CVSS 3 Score Details (7.5)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High

For more information on CVSS3 Scores, click here.

### Suggested Fix

Type: Upgrade version

Origin: https://github.com/advisories/GHSA-5v2h-r2cx-5xgj

Release Date: 2022-01-14

Fix Resolution: 4.0.10

:rescue_worker_helmet: Automatic Remediation will be attempted for this issue.
CVE-2022-21680 ### Vulnerable Library - marked-0.3.9.tgz

A markdown parser built for speed

Library home page: https://registry.npmjs.org/marked/-/marked-0.3.9.tgz

Path to dependency file: /package.json

Path to vulnerable library: /node_modules/marked/package.json

Dependency Hierarchy: - :x: **marked-0.3.9.tgz** (Vulnerable Library)

Found in HEAD commit: 0f560909b2ffd6ef4ef6430245d20517f6f55a06

Found in base branch: master

### Reachability Analysis This vulnerability is potentially reachable ``` owasp-nodejs-goat-1.3.0/server.js (Application) -> ❌ marked-0.3.9/lib/marked.js (Vulnerable Component) ```

### Vulnerability Details

Marked is a markdown parser and compiler. Prior to version 4.0.10, the regular expression `block.def` may cause catastrophic backtracking against some strings and lead to a regular expression denial of service (ReDoS). Anyone who runs untrusted markdown through a vulnerable version of marked and does not use a worker with a time limit may be affected. This issue is patched in version 4.0.10. As a workaround, avoid running untrusted markdown through marked or run marked on a worker thread and set a reasonable time limit to prevent draining resources.

Publish Date: 2022-01-14

URL: CVE-2022-21680

### Threat Assessment

Exploit Maturity: Not Defined

EPSS: 0.4%

### CVSS 3 Score Details (7.5)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High

For more information on CVSS3 Scores, click here.

### Suggested Fix

Type: Upgrade version

Origin: https://github.com/advisories/GHSA-rrrm-qjm4-v8hf

Release Date: 2022-01-14

Fix Resolution: 4.0.10

:rescue_worker_helmet: Automatic Remediation will be attempted for this issue.
WS-2020-0163 ### Vulnerable Library - marked-0.3.9.tgz

A markdown parser built for speed

Library home page: https://registry.npmjs.org/marked/-/marked-0.3.9.tgz

Path to dependency file: /package.json

Path to vulnerable library: /node_modules/marked/package.json

Dependency Hierarchy: - :x: **marked-0.3.9.tgz** (Vulnerable Library)

Found in HEAD commit: 0f560909b2ffd6ef4ef6430245d20517f6f55a06

Found in base branch: master

### Reachability Analysis This vulnerability is potentially reachable ``` owasp-nodejs-goat-1.3.0/server.js (Application) -> ❌ marked-0.3.9/lib/marked.js (Vulnerable Component) ```

### Vulnerability Details

marked before 1.1.1 is vulnerable to Regular Expression Denial of Service (REDoS). rules.js have multiple unused capture groups which can lead to a Denial of Service.

Publish Date: 2020-07-02

URL: WS-2020-0163

### Threat Assessment

Exploit Maturity: Not Defined

EPSS:

### CVSS 3 Score Details (5.9)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High

For more information on CVSS3 Scores, click here.

### Suggested Fix

Type: Upgrade version

Release Date: 2020-07-02

Fix Resolution: 1.1.1

:rescue_worker_helmet: Automatic Remediation will be attempted for this issue.
WS-2019-0027 ### Vulnerable Library - marked-0.3.9.tgz

A markdown parser built for speed

Library home page: https://registry.npmjs.org/marked/-/marked-0.3.9.tgz

Path to dependency file: /package.json

Path to vulnerable library: /node_modules/marked/package.json

Dependency Hierarchy: - :x: **marked-0.3.9.tgz** (Vulnerable Library)

Found in HEAD commit: 0f560909b2ffd6ef4ef6430245d20517f6f55a06

Found in base branch: master

### Reachability Analysis This vulnerability is potentially reachable ``` owasp-nodejs-goat-1.3.0/server.js (Application) -> ❌ marked-0.3.9/lib/marked.js (Vulnerable Component) ```

### Vulnerability Details

Versions 0.3.17 and earlier of marked has Four regexes were vulnerable to catastrophic backtracking. This leaves markdown servers open to a potential REDOS attack.

Publish Date: 2018-02-26

URL: WS-2019-0027

### Threat Assessment

Exploit Maturity: Not Defined

EPSS:

### CVSS 3 Score Details (5.3)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: Low

For more information on CVSS3 Scores, click here.

### Suggested Fix

Type: Upgrade version

Release Date: 2018-02-26

Fix Resolution: 0.3.18

:rescue_worker_helmet: Automatic Remediation will be attempted for this issue.
WS-2018-0628 ### Vulnerable Library - marked-0.3.9.tgz

A markdown parser built for speed

Library home page: https://registry.npmjs.org/marked/-/marked-0.3.9.tgz

Path to dependency file: /package.json

Path to vulnerable library: /node_modules/marked/package.json

Dependency Hierarchy: - :x: **marked-0.3.9.tgz** (Vulnerable Library)

Found in HEAD commit: 0f560909b2ffd6ef4ef6430245d20517f6f55a06

Found in base branch: master

### Reachability Analysis This vulnerability is potentially reachable ``` owasp-nodejs-goat-1.3.0/server.js (Application) -> ❌ marked-0.3.9/lib/marked.js (Vulnerable Component) ```

### Vulnerability Details

marked before 0.4.0 is vulnerable to Regular Expression Denial of Service (REDoS) through heading in marked.js.

Publish Date: 2018-04-16

URL: WS-2018-0628

### Threat Assessment

Exploit Maturity: Not Defined

EPSS:

### CVSS 3 Score Details (5.3)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: Low

For more information on CVSS3 Scores, click here.

### Suggested Fix

Type: Upgrade version

Release Date: 2018-04-16

Fix Resolution: 0.4.0

:rescue_worker_helmet: Automatic Remediation will be attempted for this issue.

:rescue_worker_helmet:Automatic Remediation will be attempted for this issue.