CVE-2021-41168

Snudown is a reddit-specific fork of the Sundown Markdown parser used by GitHub, with Python integration added. In affected versions snudown was found to be vulnerable to denial of service attacks to its reference table implementation. References written in markdown ` [reference_name]: https://www.example.com` are inserted into a hash table which was found to have a weak hash function, meaning that an attacker can reliably generate a large number of collisions for it. This makes the hash table vulnerable to a hash-collision DoS attack, a type of algorithmic complexity attack. Further the hash table allowed for duplicate entries resulting in long retrieval times. Proofs of concept and further discussion of the hash collision issue are discussed on the snudown GHSA(https://github.com/reddit/snudown/security/advisories/GHSA-6gvv-9q92-w5f6). Users are advised to update to version 1.7.0.
Configurations

Configuration 1 (hide)

cpe:2.3:a:reddit:snudown:*:*:*:*:*:*:*:*

History

17 Jul 2023, 15:17

Type Values Removed Values Added
CWE CWE-327 CWE-407

28 Oct 2021, 01:00

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 6.5
v2 : 4.0
v3 : 6.5
CWE CWE-20
CWE-400
References (MISC) https://github.com/reddit/snudown/commit/1ac2c130b210539ee1e5d67a7bac93f9d8007c0e - (MISC) https://github.com/reddit/snudown/commit/1ac2c130b210539ee1e5d67a7bac93f9d8007c0e - Patch, Third Party Advisory
References (CONFIRM) https://github.com/reddit/snudown/security/advisories/GHSA-6gvv-9q92-w5f6 - (CONFIRM) https://github.com/reddit/snudown/security/advisories/GHSA-6gvv-9q92-w5f6 - Exploit, Third Party Advisory
CPE cpe:2.3:a:reddit:snudown:*:*:*:*:*:*:*:*

21 Oct 2021, 21:15

Type Values Removed Values Added
New CVE

Information

Published : 2021-10-21 20:15

Updated : 2023-12-10 14:09


NVD link : CVE-2021-41168

Mitre link : CVE-2021-41168

CVE.ORG link : CVE-2021-41168


JSON object : View

Products Affected

reddit

  • snudown
CWE
CWE-407

Inefficient Algorithmic Complexity

CWE-20

Improper Input Validation

CWE-327

Use of a Broken or Risky Cryptographic Algorithm

CWE-400

Uncontrolled Resource Consumption