jgeraigery / snyk-cli

Snyk CLI scans and monitors your projects for security vulnerabilities.
https://snyk.io
Other
0 stars 0 forks source link

github.com/snyk/snyk-ls-v0.0.0-20240507082100-cc93dfb3c69e: 1 vulnerabilities (highest severity is: 5.1) #104

Open mend-for-github-com[bot] opened 3 weeks ago

mend-for-github-com[bot] commented 3 weeks ago
Vulnerable Library - github.com/snyk/snyk-ls-v0.0.0-20240507082100-cc93dfb3c69e

Path to dependency file: /cliv2/go.mod

Path to vulnerable library: /go/pkg/mod/cache/download/github.com/gomarkdown/markdown/@v/v0.0.0-20240419095408-642f0ee99ae2.mod

Found in HEAD commit: 7e83e87477e0886cad26f767efdb9ffd90d9fbfe

Vulnerabilities

CVE Severity CVSS Exploit Maturity EPSS Dependency Type Fixed in (github.com/snyk/snyk-ls-v0.0.0 version) Remediation Possible** Reachability
CVE-2024-44337 Medium 5.1 Not Defined 0.0% github.com/gomarkdown/markdown-v0.0.0-20240419095408-642f0ee99ae2 Transitive N/A*

*For some transitive vulnerabilities, there is no version of direct dependency with a fix. Check the "Details" section below to see if there is a version of transitive dependency where vulnerability is fixed.

**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation

Details

CVE-2024-44337 ### Vulnerable Library - github.com/gomarkdown/markdown-v0.0.0-20240419095408-642f0ee99ae2

markdown parser and HTML renderer for Go

Library home page: https://proxy.golang.org/github.com/gomarkdown/markdown/@v/v0.0.0-20240419095408-642f0ee99ae2.zip

Path to dependency file: /cliv2/go.mod

Path to vulnerable library: /go/pkg/mod/cache/download/github.com/gomarkdown/markdown/@v/v0.0.0-20240419095408-642f0ee99ae2.mod

Dependency Hierarchy: - github.com/snyk/snyk-ls-v0.0.0-20240507082100-cc93dfb3c69e (Root Library) - :x: **github.com/gomarkdown/markdown-v0.0.0-20240419095408-642f0ee99ae2** (Vulnerable Library)

Found in HEAD commit: 7e83e87477e0886cad26f767efdb9ffd90d9fbfe

Found in base branch: main

### Vulnerability Details

The package `github.com/gomarkdown/markdown` is a Go library for parsing Markdown text and rendering as HTML. Prior to pseudoversion `v0.0.0-20240729232818-a2a9c4f`, which corresponds with commit `a2a9c4f76ef5a5c32108e36f7c47f8d310322252`, there was a logical problem in the paragraph function of the parser/block.go file, which allowed a remote attacker to cause a denial of service (DoS) condition by providing a tailor-made input that caused an infinite loop, causing the program to hang and consume resources indefinitely. Submit `a2a9c4f76ef5a5c32108e36f7c47f8d310322252` contains fixes to this problem.

Publish Date: 2024-10-15

URL: CVE-2024-44337

### Threat Assessment

Exploit Maturity: Not Defined

EPSS: 0.0%

### CVSS 3 Score Details (5.1)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: Low - Availability Impact: Low

For more information on CVSS3 Scores, click here.

### Suggested Fix

Type: Upgrade version

Origin: https://www.cve.org/CVERecord?id=CVE-2024-44337

Release Date: 2024-10-15

Fix Resolution: github.com/gomarkdown/markdown-a2a9c4f76ef5a5c32108e36f7c47f8d310322252