mirror of
https://github.com/DavidAnson/markdownlint.git
synced 2026-04-26 09:46:01 +03:00
[GH-ISSUE #478] Security concern in v0.25.0 due to markdown-it dependency #2239
Labels
No labels
bug
enhancement
enhancement
enhancement
fixed in next
fixed in next
fixed in next
new rule
new rule
new rule
pull-request
question
refactoring
refactoring
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/markdownlint#2239
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @ericcornelissen on GitHub (Jan 11, 2022).
Original GitHub issue: https://github.com/DavidAnson/markdownlint/issues/478
Hi markdownlint maintainers and community 👋
I want to raise a security vulnerability (concern?1) for the community in the latest published version (
markdownlint@v0.25.0) related tomarkdown-it.References:
github.com/markdown-it/markdown-it@ffc49ab46bSince
markdown-itis pinned at12.3.0it is not possible for users ofmarkdownlintto upgrade to the latest version ofmarkdown-it,12.3.2that contains a fix. From this perspective allowing a range of versions, e.g^12.3.0, for (non-dev) dependencies would be beneficial to users.Thank you in advance!
I'd classify the vulnerability as low risk for markdownlint since, presumably, in most instances users will have full control over the MarkDown they're going to lint. However, I don't think that discredits the issue entirely. ↩︎
@DavidAnson commented on GitHub (Jan 12, 2022):
I agree with your assessment of this as being low risk, especially as denial of service attacks are more of a nuisance than a security threat. That said, it's easy enough to update and I will do so soon.
@ericcornelissen commented on GitHub (Jan 13, 2022):
Small update, the issue now has an official CVE. I updated the issue description accordingly.
Because it now has a CVE it'll show up in the
npm auditoutput and automation tools like Dependabot will start flagging it as well.