Mathjax up to v2.7.9 was discovered to contain two Regular expression Denial of Service (ReDoS) vulnerabilities in MathJax.js via the components pattern and markdownPattern. NOTE: the vendor disputes this because the regular expressions are not applied to user input; thus, there is no risk.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-v638-q856-grg8 | MathJax Regular expression Denial of Service (ReDoS) |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
| Link | Providers |
|---|---|
| https://github.com/mathjax/MathJax/issues/3074 |
|
History
Wed, 02 Oct 2024 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-10-02T13:23:58.981Z
Reserved: 2023-08-07T00:00:00
Link: CVE-2023-39663
Updated: 2024-08-02T18:18:09.624Z
Status : Modified
Published: 2023-08-29T20:15:09.990
Modified: 2024-11-21T08:15:47.080
Link: CVE-2023-39663
No data.
OpenCVE Enrichment
No data.
Weaknesses
Github GHSA