
Cloud Vulnerability DB
A community-led vulnerabilities database
A vulnerability was identified in simple-markdown version 0.5.1, tracked as CVE-2019-25103. The issue was discovered in February 2023 and relates to a regular expression denial of service (ReDoS) vulnerability in the inline code parsing functionality (GitHub Release).
The vulnerability stems from overlapping parts in the inline code regex pattern where spaces could be parsed as part of both \s* and [\S\s]*, leading to catastrophic backtracking when processing strings with multiple spaces. The issue was specifically located in the inlineCode matching functionality of the parser (GitHub Commit).
When exploited, this vulnerability could lead to denial of service conditions through exponential backtracking in the regular expression engine, potentially causing the application to become unresponsive when processing specially crafted input (GitHub Release).
The issue was addressed in version 0.5.2 of simple-markdown by modifying the regex pattern and improving escape semantics. The fix involved removing the \s* parts of the regex and implementing a post-parsing check for cases where single spaces are used to escape backticks (GitHub Release).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."