CVE-2022-23517
Summary
| CVE | CVE-2022-23517 |
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2022-12-14 17:15:00 UTC |
| Updated | 2024-02-01 16:24:00 UTC |
| Description | rails-html-sanitizer is responsible for sanitizing HTML fragments in Rails applications. Certain configurations of rails-html-sanitizer < 1.4.4 use an inefficient regular expression that is susceptible to excessive backtracking when attempting to sanitize certain SVG attributes. This may lead to a denial of service through CPU resource consumption. This issue has been patched in version 1.4.4. |
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|
| HackerOne |
MISC |
hackerone.com |
|
| fix: replace slow regex attribute check with Loofah method · rails/rails-html-sanitizer@56c61c0 · GitHub |
MISC |
github.com |
|
| [SECURITY] [DLA 3566-1] ruby-rails-html-sanitizer security update |
MISC |
lists.debian.org |
|
| Inefficient Regular Expression Complexity in rails-html-sanitizer · Advisory · rails/rails-html-sanitizer · GitHub |
MISC |
github.com |
|
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 183613 Debian Security Update for ruby-rails-html-sanitizer (CVE-2022-23517)
- 241405 Red Hat Update for Satellite 6.13 (RHSA-2023:2097)
- 6000139 Debian Security Update for ruby-rails-html-sanitizer (DLA 3566-1)
- 754914 SUSE Enterprise Linux Security Update for rubygem-rails-html-sanitizer (SUSE-SU-2023:3714-1)
- 960924 Rocky Linux Security Update for Satellite (RLSA-2023:2097)