CVE-2022-23517 – rails-html-sanitizer
Package
Manager: gem
Name: rails-html-sanitizer
Vulnerable Version: >=0 <1.4.4
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
EPSS: 0.00222 pctl0.44729
Details
Inefficient Regular Expression Complexity in rails-html-sanitizer ## Summary Certain configurations of rails-html-sanitizer `< 1.4.4` use an inefficient regular expression that is susceptible to excessive backtracking when attempting to sanitize certain SVG attributes. This may lead to a denial of service through CPU resource consumption. ## Mitigation Upgrade to rails-html-sanitizer `>= 1.4.4`. ## Severity The maintainers have evaluated this as [High Severity 7.5 (CVSS3.1)](https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). ## References - [CWE - CWE-1333: Inefficient Regular Expression Complexity (4.9)](https://cwe.mitre.org/data/definitions/1333.html) - https://hackerone.com/reports/1684163 ## Credit This vulnerability was responsibly reported by @ooooooo-q (https://github.com/ooooooo-q).
Metadata
Created: 2022-12-13T17:43:02Z
Modified: 2022-12-13T17:43:02Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/12/GHSA-5x79-w82f-gw8w/GHSA-5x79-w82f-gw8w.json
CWE IDs: ["CWE-1333"]
Alternative ID: GHSA-5x79-w82f-gw8w
Finding: F211
Auto approve: 1