Vulnerability Details : CVE-2023-22483
Potential exploit
cmark-gfm is GitHub's fork of cmark, a CommonMark parsing and rendering library and program in C. Versions prior to 0.29.0.gfm.7 are subject to several polynomial time complexity issues in cmark-gfm that may lead to unbounded resource exhaustion and subsequent denial of service. Various commands, when piped to cmark-gfm with large values, cause the running time to increase quadratically. These vulnerabilities have been patched in version 0.29.0.gfm.7.
Vulnerability category: Denial of service
Products affected by CVE-2023-22483
- cpe:2.3:a:github:cmark-gfm:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-22483
0.06%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 30 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-22483
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
3.9
|
3.6
|
NIST | |
3.5
|
LOW | CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L |
2.1
|
1.4
|
GitHub, Inc. |
CWE ids for CVE-2023-22483
-
The product does not properly control the allocation and maintenance of a limited resource, thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources.Assigned by: security-advisories@github.com (Secondary)
-
An algorithm in a product has an inefficient worst-case computational complexity that may be detrimental to system performance and can be triggered by an attacker, typically using crafted manipulations that ensure that the worst case is being reached.Assigned by: nvd@nist.gov (Primary)
References for CVE-2023-22483
-
https://github.com/github/cmark-gfm/security/advisories/GHSA-29g3-96g3-jg6c
Quadratic complexity bugs may lead to a denial of service · Advisory · github/cmark-gfm · GitHubExploit;Third Party Advisory
Jump to