CVE-2023-22491

CVSS V2 None CVSS V3 None
Description
Gatsby is a free and open source framework based on React that helps developers build websites and apps. The gatsby-transformer-remark plugin prior to versions 5.25.1 and 6.3.2 passes input through to the `gray-matter` npm package, which is vulnerable to JavaScript injection in its default configuration, unless input is sanitized. The vulnerability is present in gatsby-transformer-remark when passing input in data mode (querying MarkdownRemark nodes via GraphQL). Injected JavaScript executes in the context of the build server. To exploit this vulnerability untrusted/unsanitized input would need to be sourced by or added into a file processed by gatsby-transformer-remark. A patch has been introduced in `gatsby-transformer-remark@5.25.1` and `gatsby-transformer-remark@6.3.2` which mitigates the issue by disabling the `gray-matter` JavaScript Frontmatter engine. As a workaround, if an older version of `gatsby-transformer-remark` must be used, input passed into the plugin should be sanitized ahead of processing. It is encouraged for projects to upgrade to the latest major release branch for all Gatsby plugins to ensure the latest security updates and bug fixes are received in a timely manner.
Overview
  • CVE ID
  • CVE-2023-22491
  • Assigner
  • security-advisories@github.com
  • Vulnerability Status
  • Analyzed
  • Published Version
  • 2023-01-13T19:15:12
  • Last Modified Date
  • 2023-01-23T17:57:45
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
cpe:2.3:a:gatsbyjs:gatsby:*:*:*:*:*:node.js:*:* 1 OR 5.25.1
cpe:2.3:a:gatsbyjs:gatsby:6.3.1:*:*:*:*:node.js:*:* 1 OR
History
Created Old Value New Value Data Type Notes
2023-01-13 20:19:12 Added to TrackCVE
2023-01-13 20:19:13 Weakness Enumeration new
2023-01-17 14:14:41 2023-01-17T13:25:04 CVE Modified Date updated
2023-01-17 14:14:41 Received Awaiting Analysis Vulnerability Status updated
2023-01-20 15:14:47 Awaiting Analysis Undergoing Analysis Vulnerability Status updated
2023-01-23 19:14:03 2023-01-23T17:57:45 CVE Modified Date updated
2023-01-23 19:14:04 Undergoing Analysis Analyzed Vulnerability Status updated
2023-01-23 19:14:08 Weakness Enumeration update
2023-01-23 19:14:11 CPE Information updated