CVE Vulnerabilities

CVE-2023-39663

Inefficient Regular Expression Complexity

Published: Aug 29, 2023 | Modified: May 17, 2024
CVSS 3.x
7.5
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu
NEGLIGIBLE

Mathjax up to v2.7.9 was discovered to contain two Regular expression Denial of Service (ReDoS) vulnerabilities in MathJax.js via the components pattern and markdownPattern. NOTE: the vendor disputes this because the regular expressions are not applied to user input; thus, there is no risk.

Weakness

The product uses a regular expression with an inefficient, possibly exponential worst-case computational complexity that consumes excessive CPU cycles.

Affected Software

Name Vendor Start Version End Version
Mathjax Mathjax * 2.7.9 (including)
Mathjax Ubuntu bionic *
Mathjax Ubuntu devel *
Mathjax Ubuntu esm-apps/bionic *
Mathjax Ubuntu esm-apps/focal *
Mathjax Ubuntu esm-apps/xenial *
Mathjax Ubuntu esm-infra-legacy/trusty *
Mathjax Ubuntu focal *
Mathjax Ubuntu jammy *
Mathjax Ubuntu lunar *
Mathjax Ubuntu trusty *
Mathjax Ubuntu trusty/esm *
Mathjax Ubuntu xenial *

Extended Description

	  Attackers can create crafted inputs that
	  intentionally cause the regular expression to use
	  excessive backtracking in a way that causes the CPU
	  consumption to spike.

Potential Mitigations

References