{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-26303","assignerOrgId":"cc1ad9ee-3454-478d-9317-d3e869d708bc","state":"PUBLISHED","assignerShortName":"canonical","dateReserved":"2023-02-21T22:36:47.685Z","datePublished":"2023-02-22T23:44:40.711Z","dateUpdated":"2025-03-11T18:22:36.539Z"},"containers":{"cna":{"affected":[{"collectionURL":"https://github.com/executablebooks/markdown-it-py/releases","defaultStatus":"unaffected","packageName":"markdown-it-py","platforms":["Linux","MacOS","Windows"],"product":"markdown-it-py","repo":"https://github.com/executablebooks/markdown-it-py","vendor":"Executable Books","versions":[{"changes":[{"at":"commit ae03c61","status":"unaffected"}],"lessThan":"v2.2.0","status":"affected","version":"0","versionType":"semver"}]}],"credits":[{"lang":"en","type":"finder","value":"Mark Esler"},{"lang":"en","type":"remediation developer","value":"Chris Sewell"}],"datePublic":"2023-02-22T04:56:39.000Z","descriptions":[{"lang":"en","value":"Denial of service could be caused to markdown-it-py, before v2.2.0, if an attacker was allowed to force null assertions with specially crafted input."}],"impacts":[{"capecId":"CAPEC-267","descriptions":[{"lang":"en","value":"CAPEC-267"}]}],"metrics":[{"cvssV3_1":{"version":"3.1","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"LOW","baseSeverity":"LOW","baseScore":3.3,"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"},"format":"CVSS"}],"problemTypes":[{"descriptions":[{"cweId":"CWE-173","description":"CWE-173","lang":"en","type":"CWE"}]}],"timeline":[{"lang":"en","time":"2023-02-07T20:19:00.000Z","value":"Reported to upstream."},{"lang":"en","time":"2023-02-22T04:56:39.000Z","value":"Patched by upstream."}],"references":[{"tags":["patch"],"url":"https://github.com/executablebooks/markdown-it-py/commit/ae03c6107dfa18e648f6fdd1280f5b89092d5d49"}],"title":"markdown-it-py crash on null assertions","providerMetadata":{"orgId":"cc1ad9ee-3454-478d-9317-d3e869d708bc","shortName":"canonical","dateUpdated":"2023-02-22T23:44:40.711Z"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T11:46:24.274Z"},"title":"CVE Program Container","references":[{"tags":["patch","x_transferred"],"url":"https://github.com/executablebooks/markdown-it-py/commit/ae03c6107dfa18e648f6fdd1280f5b89092d5d49"}]},{"problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-173","lang":"en","description":"CWE-173 Improper Handling of Alternate Encoding"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-03-11T18:22:03.295337Z","id":"CVE-2023-26303","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-03-11T18:22:36.539Z"}}]}}