CVE-2023-42821

CVSS 3.1 Score 7.5 of 10 (high)

Details

Published Sep 22, 2023
Updated: Sep 26, 2023
CWE ID 125

Summary

CVE-2023-42821 is a vulnerability that affects the package github.com/gomarkdown/markdown, a Go library used for parsing Markdown text and rendering it as HTML. It was present in versions prior to pseudoversion 0.0.0-20230922105210-14b16010c2ee or commit 14b16010c2ee7ff33a940a541d993bd043a88940. This vulnerability allows for an out-of-bounds read when parsing malformed markdown input with the parser.Mmark extension, potentially leading to a denial of service. The specific panic occurs in the citation.go file on line 69 when the parser tries to access an element beyond its length. A patch for this issue is included in commit 14b16010c2ee7ff33a940a541d993bd043a88940/pseudoversion 0.0.0-20230922105210-14b16010c2ee. The vulnerability has a base severity rating of HIGH with a base score of 7.5 according to NIST's National Vulnerability Database (NVD).

Explore Beyond the CVE Basics with Recorded Future's Vulnerability Intelligence

Note: This is just a basic overview providing quick insights into CVE-2023-42821 information. Gain full access to comprehensive CVE data, risk scores, prioritization, and mitigation data through Recorded Future's Vulnerability Intelligence:
  • Prioritize with Risk-Based Scoring
  • Explore the Extensive Vulnerability Database
  • Receive Early Alerts on Emerging CVEs
  • Focus on Critical Exploitable Vulnerabilities
  • Streamline Remediation with Integration Options