CVE-2023-42821

CVSS 3.1 Score 7.5 of 10 (high)

Details

Published Sep 22, 2023
Updated: Sep 26, 2023
CWE ID 125

Summary

CVE-2023-42821 is a vulnerability that affects the package `github.com/gomarkdown/markdown`, a Go library used for parsing Markdown text and rendering it as HTML. It was present in versions prior to pseudoversion `0.0.0-20230922105210-14b16010c2ee` or commit `14b16010c2ee7ff33a940a541d993bd043a88940`. This vulnerability allows for an out-of-bounds read when parsing malformed markdown input with the parser.Mmark extension, potentially leading to a denial of service. The specific panic occurs in the `citation.go` file on line 69 when the parser tries to access an element beyond its length. A patch for this issue is included in commit `14b16010c2ee7ff33a940a541d993bd043a88940`/pseudoversion `0.0.0-20230922105210-14b16010c2ee`. The vulnerability has a base severity rating of HIGH with a base score of 7.5 according to NIST's National Vulnerability Database (NVD).

Prevent cyber attacks with Recorded Future by prioritizing and patching critical vulnerabilities being exploited by threat actors targeting your industry. Book your demo to learn more.

Share

Prioritize, Pinpoint, and Act to Prevent Vulnerability Exploits with Recorded Future

Note: This is just a basic overview providing quick insights into CVE-2023-42821 information. Gain full access to comprehensive CVE data, third party vulnerabilities, compromised credentials and more with Recorded Future
  • Gain complete coverage of your cyber, third party, and physical attack surface
  • Proactively mitigate threats before they turn into costly attacks
  • Make fast, effective, data-driven decisions