First published: Thu Dec 08 2022(Updated: )
Nokogiri is an open source XML and HTML library for the Ruby programming language. Nokogiri `1.13.8` and `1.13.9` fail to check the return value from `xmlTextReaderExpand` in the method `Nokogiri::XML::Reader#attribute_hash`. This can lead to a null pointer exception when invalid markup is being parsed. For applications using `XML::Reader` to parse untrusted inputs, this may potentially be a vector for a denial of service attack. Users are advised to upgrade to Nokogiri `>= 1.13.10`. Users may be able to search their code for calls to either `XML::Reader#attributes` or `XML::Reader#attribute_hash` to determine if they are affected.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Nokogiri Nokogiri | =1.13.8 | |
Nokogiri Nokogiri | =1.13.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-23476 is a vulnerability in the Nokogiri library for Ruby that can lead to a null pointer exception when invalid markup is being parsed.
CVE-2022-23476 affects Nokogiri versions 1.13.8 and 1.13.9.
CVE-2022-23476 has a severity rating of 7.5 (high).
To fix CVE-2022-23476, you should update Nokogiri to a version that includes the necessary security patches.
You can find more information about CVE-2022-23476 in the references section, which includes links to the GitHub commits and security advisories.