CVE-2022-23517

rails-html-sanitizer is responsible for sanitizing HTML fragments in Rails applications. Certain configurations of rails-html-sanitizer < 1.4.4 use an inefficient regular expression that is susceptible to excessive backtracking when attempting to sanitize certain SVG attributes. This may lead to a denial of service through CPU resource consumption. This issue has been patched in version 1.4.4.
Configurations

Configuration 1 (hide)

cpe:2.3:a:rubyonrails:rails_html_sanitizers:*:*:*:*:*:rails:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

History

01 Feb 2024, 16:24

Type Values Removed Values Added
CPE cpe:2.3:a:rails_html_sanitizer_project:rails_html_sanitizer:*:*:*:*:*:ruby:*:* cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:a:rubyonrails:rails_html_sanitizers:*:*:*:*:*:rails:*:*
References
  • (MISC) https://lists.debian.org/debian-lts-announce/2023/09/msg00012.html - Mailing List, Third Party Advisory

16 Dec 2022, 19:13

Type Values Removed Values Added
New CVE

Information

Published : 2022-12-14 17:15

Updated : 2024-02-04 23:14


NVD link : CVE-2022-23517

Mitre link : CVE-2022-23517

CVE.ORG link : CVE-2022-23517


JSON object : View

Products Affected

rubyonrails

  • rails_html_sanitizers

debian

  • debian_linux
CWE
CWE-1333

Inefficient Regular Expression Complexity