CVE-2023-22491
CVSS V2 None
CVSS V3 None
Description
Gatsby is a free and open source framework based on React that helps developers build websites and apps. The gatsby-transformer-remark plugin prior to versions 5.25.1 and 6.3.2 passes input through to the `gray-matter` npm package, which is vulnerable to JavaScript injection in its default configuration, unless input is sanitized. The vulnerability is present in gatsby-transformer-remark when passing input in data mode (querying MarkdownRemark nodes via GraphQL). Injected JavaScript executes in the context of the build server. To exploit this vulnerability untrusted/unsanitized input would need to be sourced by or added into a file processed by gatsby-transformer-remark. A patch has been introduced in `gatsby-transformer-remark@5.25.1` and `gatsby-transformer-remark@6.3.2` which mitigates the issue by disabling the `gray-matter` JavaScript Frontmatter engine. As a workaround, if an older version of `gatsby-transformer-remark` must be used, input passed into the plugin should be sanitized ahead of processing. It is encouraged for projects to upgrade to the latest major release branch for all Gatsby plugins to ensure the latest security updates and bug fixes are received in a timely manner.
Overview
- CVE ID
- CVE-2023-22491
- Assigner
- security-advisories@github.com
- Vulnerability Status
- Analyzed
- Published Version
- 2023-01-13T19:15:12
- Last Modified Date
- 2023-01-23T17:57:45
Weakness Enumerations
CPE Configuration (Product)
CPE | Vulnerable | Operator | Version Start | Version End |
---|---|---|---|---|
cpe:2.3:a:gatsbyjs:gatsby:*:*:*:*:*:node.js:*:* | 1 | OR | 5.25.1 | |
cpe:2.3:a:gatsbyjs:gatsby:6.3.1:*:*:*:*:node.js:*:* | 1 | OR |
References
Reference URL | Reference Tags |
---|---|
https://github.com/gatsbyjs/gatsby/security/advisories/GHSA-7ch4-rr99-cqcw |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2023-22491 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22491 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2023-01-13 20:19:12 | Added to TrackCVE | |||
2023-01-13 20:19:13 | Weakness Enumeration | new | ||
2023-01-17 14:14:41 | 2023-01-17T13:25:04 | CVE Modified Date | updated | |
2023-01-17 14:14:41 | Received | Awaiting Analysis | Vulnerability Status | updated |
2023-01-20 15:14:47 | Awaiting Analysis | Undergoing Analysis | Vulnerability Status | updated |
2023-01-23 19:14:03 | 2023-01-23T17:57:45 | CVE Modified Date | updated | |
2023-01-23 19:14:04 | Undergoing Analysis | Analyzed | Vulnerability Status | updated |
2023-01-23 19:14:08 | Weakness Enumeration | update | ||
2023-01-23 19:14:11 | CPE Information | updated |