Open
Description
WS-2019-0027 - Medium Severity Vulnerability
Vulnerable Library - marked-0.3.17.tgz
A markdown parser built for speed
Library home page: https://registry.npmjs.org/marked/-/marked-0.3.17.tgz
Path to dependency file: /tmp/ws-scm/guilds.osweekends.com/package.json
Path to vulnerable library: /tmp/ws-scm/guilds.osweekends.com/node_modules/marked/package.json
Dependency Hierarchy:
- pillars-0.7.1.tgz (Root Library)
- templated-0.3.9.tgz
- ❌ marked-0.3.17.tgz (Vulnerable Library)
- templated-0.3.9.tgz
Found in HEAD commit: 7c3567c7b8d78dce0fcb947eca5db3cca195eb19
Vulnerability Details
Versions 0.3.17 and earlier of marked has Four regexes were vulnerable to catastrophic backtracking. This leaves markdown servers open to a potential REDOS attack.
Publish Date: 2019-03-17
URL: WS-2019-0027
Suggested Fix
Type: Upgrade version
Origin: markedjs/marked@b15e42b
Release Date: 2019-03-17
Fix Resolution: 0.3.18
Step up your Open Source Security Game with WhiteSource here