First published: Tue Dec 13 2022(Updated: )
## Summary Certain configurations of rails-html-sanitizer `< 1.4.4` use an inefficient regular expression that is susceptible to excessive backtracking when attempting to sanitize certain SVG attributes. This may lead to a denial of service through CPU resource consumption. ## Mitigation Upgrade to rails-html-sanitizer `>= 1.4.4`. ## Severity The maintainers have evaluated this as [High Severity 7.5 (CVSS3.1)](https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). ## References - [CWE - CWE-1333: Inefficient Regular Expression Complexity (4.9)](https://cwe.mitre.org/data/definitions/1333.html) - https://hackerone.com/reports/1684163 ## Credit This vulnerability was responsibly reported by @ooooooo-q (https://github.com/ooooooo-q).
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
rubygems/rails-html-sanitizer | <1.4.4 | 1.4.4 |
redhat/rubygem-rails-html-sanitizer | <0:1.4.4-1.el8 | 0:1.4.4-1.el8 |
Rails Html Sanitizer Project Rails Html Sanitizer | <1.4.4 | |
redhat/rubygem-rails-html-sanitizer | <1.4.4 | 1.4.4 |
Rubyonrails Rails Html Sanitizers | <1.4.4 | |
Debian Debian Linux | =10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2022-23517.
The title of the vulnerability is 'An inefficient Regular Expression vulnerability was found in rubygem rails-html-sanitizer.'
The severity of CVE-2022-23517 is high.
The mitigation for CVE-2022-23517 is to upgrade to version 1.4.4 or higher of rails-html-sanitizer.
Certain configurations of rails-html-sanitizer < 1.4.4 are affected by CVE-2022-23517.