CVE-2015-8854: Regular Expression Denial of Service in marked
(updated )
The marked package before 0.3.4 for Node.js allows attackers to cause a denial of service (CPU consumption) via unspecified vectors that trigger a “catastrophic backtracking issue for the em inline rule,” aka a “regular expression denial of service (ReDoS).”
References
- www.openwall.com/lists/oss-security/2016/04/20/11
- github.com/advisories/GHSA-hjcp-j389-59ff
- github.com/chjj/marked/issues/497
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BO2RMVVZVV6NFTU46B5RYRK7ZCXYARZS/
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M6BJG6RGDH7ZWVVAUFBFI5L32RSMQN2S/
- nodesecurity.io/advisories/23
- nvd.nist.gov/vuln/detail/CVE-2015-8854
- support.f5.com/csp/article/K05052081?utm_source=f5support&utm_medium=RSS
- www.npmjs.com/advisories/23
- www.owasp.org/index.php/Regular_expression_Denial_of_Service_-_ReDoS
Detect and mitigate CVE-2015-8854 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →