Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

chore(deps): update dependency marked to 4.0.10 [security] - abandoned #7

Open
wants to merge 1 commit into
base: master
Choose a base branch
from

Conversation

renovate[bot]
Copy link

@renovate renovate bot commented May 16, 2021

Mend Renovate

This PR contains the following updates:

Package Change
marked 1.2.5 -> 4.0.10

GitHub Vulnerability Alerts

CVE-2021-21306

Impact

What kind of vulnerability is it? Who is impacted?

Regular expression Denial of Service

A Denial of Service attack can affect anyone who runs user generated code through marked.

Patches

Has the problem been patched? What versions should users upgrade to?

patched in v2.0.0

Workarounds

Is there a way for users to fix or remediate the vulnerability without upgrading?

None.

References

Are there any links users can visit to find out more?

https://github.com/markedjs/marked/issues/1927
https://owasp.org/www-community/attacks/Regular_expression_Denial_of_Service_-_ReDoS

For more information

If you have any questions or comments about this advisory:

CVE-2022-21681

Impact

What kind of vulnerability is it?

Denial of service.

The regular expression inline.reflinkSearch may cause catastrophic backtracking against some strings.
PoC is the following.

import * as marked from 'marked';

console.log(marked.parse(`[x]: x

\\[\\](\\[\\](\\[\\](\\[\\](\\[\\](\\[\\](\\[\\](\\[\\](\\[\\](\\[\\](\\[\\](\\[\\](\\[\\](\\[\\](\\[\\](\\[\\](\\[\\](\\[\\](\\[\\](\\[\\](\\[\\](\\[\\](\\[\\](\\[\\](\\[\\](\\[\\](\\[\\](\\[\\](\\[\\](\\[\\](`));

Who is impacted?

Anyone who runs untrusted markdown through marked and does not use a worker with a time limit.

Patches

Has the problem been patched?

Yes

What versions should users upgrade to?

4.0.10

Workarounds

Is there a way for users to fix or remediate the vulnerability without upgrading?

Do not run untrusted markdown through marked or run marked on a worker thread and set a reasonable time limit to prevent draining resources.

References

Are there any links users can visit to find out more?

For more information

If you have any questions or comments about this advisory:

CVE-2022-21680

Impact

What kind of vulnerability is it?

Denial of service.

The regular expression block.def may cause catastrophic backtracking against some strings.
PoC is the following.

import * as marked from "marked";

marked.parse(`[x]:${' '.repeat(1500)}x ${' '.repeat(1500)} x`);

Who is impacted?

Anyone who runs untrusted markdown through marked and does not use a worker with a time limit.

Patches

Has the problem been patched?

Yes

What versions should users upgrade to?

4.0.10

Workarounds

Is there a way for users to fix or remediate the vulnerability without upgrading?

Do not run untrusted markdown through marked or run marked on a worker thread and set a reasonable time limit to prevent draining resources.

References

Are there any links users can visit to find out more?

For more information

If you have any questions or comments about this advisory:


Configuration

📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).

🚦 Automerge: Enabled.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR has been generated by Mend Renovate. View repository job log here.

@renovate
Copy link
Author

renovate bot commented May 16, 2021

Branch automerge failure

This PR was configured for branch automerge, however this is not possible so it has been raised as a PR instead.


  • Branch has one or more failed status checks

@renovate renovate bot force-pushed the renovate/npm-marked-vulnerability branch 4 times, most recently from 9bbfbdf to aa7c972 Compare May 16, 2021 20:36
@renovate renovate bot force-pushed the renovate/npm-marked-vulnerability branch 3 times, most recently from b535ee1 to 53b6e6b Compare June 9, 2021 11:40
@renovate renovate bot force-pushed the renovate/npm-marked-vulnerability branch 2 times, most recently from 3f1615b to 6d85549 Compare August 10, 2021 23:39
@renovate renovate bot force-pushed the renovate/npm-marked-vulnerability branch from 6d85549 to 4a1c80f Compare September 2, 2021 22:41
@renovate renovate bot force-pushed the renovate/npm-marked-vulnerability branch from 4a1c80f to e068a69 Compare September 20, 2021 23:38
@renovate renovate bot force-pushed the renovate/npm-marked-vulnerability branch from e068a69 to 5db357d Compare March 7, 2022 10:47
@renovate renovate bot changed the title chore(deps): update dependency marked to 2.0.0 [security] chore(deps): update dependency marked to 4.0.10 [security] Mar 7, 2022
@renovate renovate bot force-pushed the renovate/npm-marked-vulnerability branch 6 times, most recently from 49d0f39 to 85cccbd Compare May 16, 2022 19:19
@renovate renovate bot force-pushed the renovate/npm-marked-vulnerability branch from 85cccbd to f23ad4c Compare June 4, 2022 01:47
@renovate renovate bot changed the title chore(deps): update dependency marked to 4.0.10 [security] chore(deps): update dependency marked to 4.0.10 [SECURITY] Jun 27, 2022
@renovate renovate bot changed the title chore(deps): update dependency marked to 4.0.10 [SECURITY] chore(deps): update dependency marked to 4.0.10 [security] Jun 28, 2022
@renovate renovate bot changed the title chore(deps): update dependency marked to 4.0.10 [security] chore(deps): update dependency marked to 4.0.10 [security] - autoclosed Jul 1, 2022
@renovate renovate bot closed this Jul 1, 2022
@renovate renovate bot deleted the renovate/npm-marked-vulnerability branch July 1, 2022 01:56
@renovate renovate bot changed the title chore(deps): update dependency marked to 4.0.10 [security] - autoclosed chore(deps): update dependency marked to 4.0.10 [security] Jul 1, 2022
@renovate renovate bot restored the renovate/npm-marked-vulnerability branch July 1, 2022 04:05
@renovate renovate bot reopened this Jul 1, 2022
@renovate renovate bot changed the title chore(deps): update dependency marked to 4.0.10 [security] chore(deps): update dependency marked to 4.0.10 [security] - abandoned Mar 24, 2023
@renovate
Copy link
Author

renovate bot commented Mar 24, 2023

Autoclosing Skipped

This PR has been flagged for autoclosing. However, it is being skipped due to the branch being already modified. Please close/delete it manually or report a bug if you think this is in error.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant