Description
The marked package before 0.3.4 for Node.js allows attackers to cause a denial of service (CPU consumption) via unspecified vectors that trigger a "catastrophic backtracking issue for the em inline rule," aka a "regular expression denial of service (ReDoS)."
Remediation
References
http://www.openwall.com/lists/oss-security/2016/04/20/11
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BO2RMVVZVV6NFTU46B5RYRK7ZCXYARZS/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M6BJG6RGDH7ZWVVAUFBFI5L32RSMQN2S/
https://nodesecurity.io/advisories/23
https://support.f5.com/csp/article/K05052081?utm_source=f5support&%3Butm_medium=RSS
Related Vulnerabilities
CVE-2023-49620 Vulnerability in maven package org.apache.dolphinscheduler:dolphinscheduler-api
CVE-2019-10363 Vulnerability in maven package io.jenkins:configuration-as-code
CVE-2020-15138 Vulnerability in maven package org.webjars.npm:prismjs
CVE-2021-43812 Vulnerability in npm package @auth0/nextjs-auth0
CVE-2021-43307 Vulnerability in maven package org.webjars.npm:semver-regex