Regular Expression Denial of Service

Module: marked

Published: January 22nd, 2015

Reported by: Barış Soner Uşaklı

CVE-2015-8854

CWE-

Vulnerable: <=0.3.3
Patched: >=0.3.4

Overview

Marked 0.3.3 and earlier is vulnerable to regular expression denial of service (ReDoS) when certain types of input are passed in to be parsed.

"The Regular expression Denial of Service (ReDoS) is a Denial of Service attack, that exploits the fact that most Regular Expression implementations may reach extreme situations that cause them to work very slowly (exponentially related to input size). An attacker can then cause a program using a Regular Expression to enter these extreme situations and then hang for a very long time." [1]

Marked's catastrophic backtracking issue for the em inline rule has now been patched in 0.3.4.

Remediation

Update to marked v0.3.4 or later.

References

Sign up FREE for
nsp Continuous Security

Free for open source and the first private repo,
then just $1/mo per private repo