
Cloud Vulnerability DB
A community-led vulnerabilities database
The vulnerability (GHSA-xxmq-4vph-956w) affects Comrak, a Rust-based Markdown parser, in versions prior to 0.17.0. Discovered and disclosed on March 28, 2023, this moderate severity vulnerability allows attackers to trigger the production of excessive output when parsing Markdown documents. The issue stems from the handling of references in markdown documents, which could generate overly large responses (GitHub Advisory).
The vulnerability has a CVSS v3.1 score of 5.3 (Moderate) with the following vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L. The issue is related to an upstream cmark problem where a large number of references in a markdown document can trigger an overly large response. The vulnerability requires no privileges or user interaction and can be exploited over the network, though it only affects availability without impacting confidentiality or integrity (GitHub Advisory).
When exploited, this vulnerability can lead to the production of excessive output, potentially causing resource exhaustion and affecting system availability. The impact is primarily focused on the availability aspect of the system, with no direct effect on data confidentiality or integrity (GitHub Advisory).
The vulnerability has been patched in version 0.17.0 of Comrak. The fix implements a 100Kb maximum limit on reference output through commit 70f97f3. No alternative workarounds are available, making upgrading to version 0.17.0 or later the only mitigation option (Comrak Release).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."