GHSA-4qw4-jpp4-8gvp: Unbounded resource exhaustion in cmark-gfm autolink extension may lead to denial of service
N/A
CVSS Score
Basic Information
CVE ID
-
GHSA ID
EPSS Score
-
CWE
Published
9/21/2022
Updated
1/7/2023
KEV Status
No
Technology
Ruby
Technical Details
CVSS Vector
-
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
commonmarker | rubygems | < 0.23.6 | 0.23.6 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from cmark-gfm's autolink processing implementation. Key indicators:
- The workaround suggests disabling autolink extension
- The CWE-400 classification indicates algorithmic complexity issues
- The patch involved updating to a cmark-gfm commit that specifically addresses autolink handling
- Autolink parsing traditionally involves pattern scanning which is prone to quadratic complexity with nested loops
- The reference to 'polynomial time complexity' strongly suggests functions with nested input-dependent loops
- Historical context of similar vulnerabilities in markdown parsers often points to URI/email autolink handlers as hotspots for regex/scanning inefficiencies