CVE-2023-39663

Mathjax up to v2.7.9 was discovered to contain two Regular expression Denial of Service (ReDoS) vulnerabilities in MathJax.js via the components pattern and markdownPattern. NOTE: the vendor disputes this because the regular expressions are not applied to user input; thus, there is no risk.
References
Link Resource
https://github.com/mathjax/MathJax/issues/3074 Exploit Issue Tracking Vendor Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:mathjax:mathjax:*:*:*:*:*:*:*:*

History

07 Nov 2023, 04:17

Type Values Removed Values Added
Summary Mathjax up to v2.7.9 was discovered to contain two Regular expression Denial of Service (ReDoS) vulnerabilities in MathJax.js via the components pattern and markdownPattern. Mathjax up to v2.7.9 was discovered to contain two Regular expression Denial of Service (ReDoS) vulnerabilities in MathJax.js via the components pattern and markdownPattern. NOTE: the vendor disputes this because the regular expressions are not applied to user input; thus, there is no risk.
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5
CWE CWE-1333
References (MISC) https://github.com/mathjax/MathJax/issues/3074 - (MISC) https://github.com/mathjax/MathJax/issues/3074 - Exploit, Issue Tracking, Vendor Advisory
First Time Mathjax
Mathjax mathjax
CPE cpe:2.3:a:mathjax:mathjax:*:*:*:*:*:*:*:*

29 Aug 2023, 20:41

Type Values Removed Values Added
New CVE

Information

Published : 2023-08-29 20:15

Updated : 2024-08-02 19:15


NVD link : CVE-2023-39663

Mitre link : CVE-2023-39663


JSON object : View

Products Affected

mathjax

  • mathjax
CWE
CWE-1333

Inefficient Regular Expression Complexity