Dismissed
Permalink
CVE-2024-28243
6.5 MEDIUM
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): LOW
- Privileges required (PR): LOW
- User interaction (UI): NONE
- Scope (S): UNCHANGED
- Confidentiality impact (C): NONE
- Integrity impact (I): NONE
- Availability impact (A): HIGH
by @LeSuisse Activity log
- Created automatic suggestion
-
@LeSuisse
removed
7 packages
- mdbook-katex
- pandoc-katex
- nodePackages.katex
- nodePackages_latest.katex
- python312Packages.sphinxcontrib-katex
- python313Packages.sphinxcontrib-katex
- python314Packages.sphinxcontrib-katex
- @LeSuisse dismissed
KaTeX's maxExpand bypassed by \edef
KaTeX is a JavaScript library for TeX math rendering on the web. KaTeX users who render untrusted mathematical expressions could encounter malicious input using `\edef` that causes a near-infinite loop, despite setting `maxExpand` to avoid such loops. This can be used as an availability attack, where e.g. a client rendering another user's KaTeX input will be unable to use the site due to memory overflow, tying up the main thread, or stack overflow. Upgrade to KaTeX v0.16.10 to remove this vulnerability.
References
- https://github.com/KaTeX/KaTeX/security/advisories/GHSA-64fm-8hw2-v72w x_refsource_CONFIRM
- https://github.com/KaTeX/KaTeX/commit/e88b4c357f978b1bca8edfe3297f0aa309bcbe34 x_refsource_MISC
- https://github.com/KaTeX/KaTeX/commit/e88b4c357f978b1bca8edfe3297f0aa309bcbe34 x_refsource_MISC
- https://github.com/KaTeX/KaTeX/security/advisories/GHSA-64fm-8hw2-v72w x_refsource_CONFIRM
- https://github.com/KaTeX/KaTeX/security/advisories/GHSA-64fm-8hw2-v72w x_transferred x_refsource_CONFIRM
- https://github.com/KaTeX/KaTeX/commit/e88b4c357f978b1bca8edfe3297f0aa309bcbe34 x_transferred x_refsource_MISC
- https://github.com/KaTeX/KaTeX/commit/e88b4c357f978b1bca8edfe3297f0aa309bcbe34 x_refsource_MISC
- https://github.com/KaTeX/KaTeX/security/advisories/GHSA-64fm-8hw2-v72w x_refsource_CONFIRM
- https://github.com/github/advisory-database/pull/6777 x_refsource_MISC
- https://github.com/KaTeX/KaTeX/security/advisories/GHSA-64fm-8hw2-v72w x_transferred x_refsource_CONFIRM
- https://github.com/KaTeX/KaTeX/commit/e88b4c357f978b1bca8edfe3297f0aa309bcbe34 x_transferred x_refsource_MISC
Affected products
KaTeX
- ==>= v0.10.0-beta, < 0.16.10
- ==>= 0.12.0, < 0.16.10
Package maintainers
-
@pyrox0 Pyrox <pyrox@pyrox.dev>