{"api_version":"1","generated_at":"2026-04-23T01:00:14+00:00","cve":"CVE-2023-2798","urls":{"html":"https://cve.report/CVE-2023-2798","api":"https://cve.report/api/cve/CVE-2023-2798.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2023-2798","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2023-2798"},"summary":{"title":"CVE-2023-2798","description":"Those using HtmlUnit to browse untrusted webpages may be vulnerable to Denial of service attacks (DoS). If HtmlUnit is running on user supplied web pages, an attacker may supply content that causes HtmlUnit to crash by a stack overflow. This effect may support a denial of service attack.This issue affects htmlunit before 2.70.0.","state":"PUBLIC","assigner":"security@google.com","published_at":"2023-05-25 14:15:00","updated_at":"2023-12-07 17:56:00"},"problem_types":["CWE-787"],"metrics":[],"references":[{"url":"https://github.com/HtmlUnit/htmlunit/commit/940dc7fd","name":"https://github.com/HtmlUnit/htmlunit/commit/940dc7fd","refsource":"MISC","tags":[],"title":"remove recursion to make the fuzzer happy · HtmlUnit/htmlunit@940dc7f · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=54613","name":"https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=54613","refsource":"MISC","tags":[],"title":"54613 - \n \n \n oss-fuzz -\n \n \n OSS-Fuzz: Fuzzing the planet - \n \n Monorail","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2023-2798","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-2798","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2023","cve_id":"2798","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"htmlunit","cpe5":"htmlunit","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"2798","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"htmlunit_project","cpe5":"htmlunit","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2023-2798","ASSIGNER":"security@google.com","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"Those using HtmlUnit to browse untrusted webpages may be vulnerable to Denial of service attacks (DoS). If HtmlUnit is running on user supplied web pages, an attacker may supply content that causes HtmlUnit to crash by a stack overflow. This effect may support a denial of service attack.This issue affects htmlunit before 2.70.0.\n\n"}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-400 Uncontrolled Resource Consumption","cweId":"CWE-400"}]}]},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"references":{"reference_data":[{"url":"https://github.com/HtmlUnit/htmlunit/commit/940dc7fd","refsource":"MISC","name":"https://github.com/HtmlUnit/htmlunit/commit/940dc7fd"},{"url":"https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=54613","refsource":"MISC","name":"https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=54613"}]},"generator":{"engine":"Vulnogram 0.1.0-dev"},"source":{"discovery":"UNKNOWN"},"credits":[{"lang":"en","value":"OSS-Fuzz"}],"impact":{"cvss":[{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":7.5,"baseSeverity":"HIGH","confidentialityImpact":"NONE","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","version":"3.1"}]}},"nvd":{"publishedDate":"2023-05-25 14:15:00","lastModifiedDate":"2023-12-07 17:56:00","problem_types":["CWE-787"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH","baseScore":7.5,"baseSeverity":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:htmlunit:htmlunit:*:*:*:*:*:*:*:*","versionEndExcluding":"2.70.0","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}