CVE-2023-39663

Mathjax up to v2.7.9 was discovered to contain two Regular expression Denial of Service (ReDoS) vulnerabilities in MathJax.js via the components pattern and markdownPattern. NOTE: the vendor disputes this because the regular expressions are not applied to user input; thus, there is no risk.
References
Link Resource
https://github.com/mathjax/MathJax/issues/3074 Exploit Issue Tracking Vendor Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:mathjax:mathjax:*:*:*:*:*:*:*:*

History

07 Nov 2023, 04:17

Type Values Removed Values Added
CWE CWE-1333
Summary Mathjax up to v2.7.9 was discovered to contain two Regular expression Denial of Service (ReDoS) vulnerabilities in MathJax.js via the components pattern and markdownPattern. Mathjax up to v2.7.9 was discovered to contain two Regular expression Denial of Service (ReDoS) vulnerabilities in MathJax.js via the components pattern and markdownPattern. NOTE: the vendor disputes this because the regular expressions are not applied to user input; thus, there is no risk.
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5
CPE cpe:2.3:a:mathjax:mathjax:*:*:*:*:*:*:*:*
References (MISC) https://github.com/mathjax/MathJax/issues/3074 - (MISC) https://github.com/mathjax/MathJax/issues/3074 - Exploit, Issue Tracking, Vendor Advisory
First Time Mathjax
Mathjax mathjax

29 Aug 2023, 20:41

Type Values Removed Values Added
New CVE

Information

Published : 2023-08-29 20:15

Updated : 2024-08-02 19:15


NVD link : CVE-2023-39663

Mitre link : CVE-2023-39663


JSON object : View

Products Affected

mathjax

  • mathjax
CWE
CWE-1333

Inefficient Regular Expression Complexity