You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
I have just took a look how commonmark.js deals with the pathological inputs in Cmark's pathological_tests.py and in recently reported Cmark bugs.
Below is list of commands generating input which, after copying into http://try.commonmark.org/, makes JS interpreter in Firefox or Chrome unresponsive for looong time, many of them even result in browser offering user to kill the script.
In vast majority of applications user may likely only DoS-attack his own browser so security impact of these is limited. Still, it should be fixed.
I have just took a look how commonmark.js deals with the pathological inputs in Cmark's
pathological_tests.py
and in recently reported Cmark bugs.Below is list of commands generating input which, after copying into http://try.commonmark.org/, makes JS interpreter in Firefox or Chrome unresponsive for looong time, many of them even result in browser offering user to kill the script.
In vast majority of applications user may likely only DoS-attack his own browser so security impact of these is limited. Still, it should be fixed.
"Openers and closers multiple of 3":
(Fixed in CMark, see commonmark/cmark#178)
"Nested block quotes":
(Works in CMark)
"Backticks":
(Fixed in CMark, see commonmark/cmark@8ed5c9d)
"Unclosed inline links":
Fixed in cmark: see commonmark/cmark#214
Broken in cmark: see commonmark/cmark#218.
"Many ref. definitions"
(Fixed in Cmark, see commonmark/cmark#232)
The text was updated successfully, but these errors were encountered: