Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLWhnbWctaGhjOC1nNXdy

CKEditor 5 Markdown plugin Regular expression Denial of Service

Impact

A regular expression denial of service (ReDoS) vulnerability has been discovered in the CKEditor 5 Markdown plugin code. The vulnerability allowed to abuse a link recognition regular expression, which could cause a significant performance drop resulting in a browser tab freeze. It affects all users using the CKEditor 5 Markdown plugin at version <= 24.0.0.

Patches

The problem has been recognized and patched. The fix will be available in version 25.0.0.

Workarounds

The user can work around the issue by:

More information

If you have any questions or comments about this advisory:

Acknowledgements

The CKEditor 5 team would like to thank Erik Krogh Kristensen from the GitHub team for recognizing this vulnerability and
Alvaro Muñoz from GitHub for reporting it.

Permalink: https://github.com/advisories/GHSA-hgmg-hhc8-g5wr
JSON: https://advisories.ecosyste.ms/api/v1/advisories/MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLWhnbWctaGhjOC1nNXdy
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: about 3 years ago
Updated: about 1 year ago


CVSS Score: 6.5
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Identifiers: GHSA-hgmg-hhc8-g5wr, CVE-2021-21254
References: Repository: https://github.com/ckeditor/ckeditor5
Blast Radius: 15.7

Affected Packages

npm:@ckeditor/ckeditor5-markdown-gfm
Dependent packages: 434
Dependent repositories: 258
Downloads: 86,663 last month
Affected Version Ranges: <= 24.0.0
Fixed in: 25.0.0
All affected versions: 0.3.0, 0.4.0, 0.4.1, 0.4.2, 0.4.3, 0.4.4, 10.0.0, 10.0.1, 10.0.2, 10.0.3, 10.0.4, 11.0.0, 11.0.1, 11.0.2, 11.0.3, 11.0.4, 11.0.5, 15.0.0, 16.0.0, 17.0.0, 18.0.0, 19.0.0, 19.0.1, 20.0.0, 21.0.0, 22.0.0, 23.0.0, 23.1.0, 24.0.0
All unaffected versions: 25.0.0, 26.0.0, 27.0.0, 27.1.0, 28.0.0, 29.0.0, 29.1.0, 29.2.0, 30.0.0, 31.0.0, 31.1.0, 32.0.0, 33.0.0, 34.0.0, 34.1.0, 34.2.0, 35.0.0, 35.0.1, 35.1.0, 35.2.0, 35.2.1, 35.3.0, 35.3.1, 35.3.2, 35.4.0, 36.0.0, 36.0.1, 37.0.0, 37.0.1, 37.1.0, 38.0.0, 38.0.1, 38.1.0, 38.1.1, 39.0.0, 39.0.1, 39.0.2, 40.0.0, 40.1.0, 40.2.0, 41.0.0, 41.1.0, 41.2.0, 41.2.1, 41.3.0, 41.3.1