CVE-2022-23514Regex Denial of Service in Loofah

Severity
7.5HIGHNVD
EPSS
0.3%
top 51.76%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 14

Description

Loofah is a general library for manipulating and transforming HTML/XML documents and fragments, built on top of Nokogiri. Loofah < 2.19.1 contains an inefficient regular expression that is susceptible to excessive backtracking when attempting to sanitize certain SVG attributes. This may lead to a denial of service through CPU resource consumption. This issue is patched in version 2.19.1.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages4 packages

CVEListV5flavorjones/loofah< 2.19.1
debiandebian/ruby-loofah< ruby-loofah 2.19.1-1 (bookworm)
NVDloofah_project/loofah< 2.19.1
RubyGemsloofah_project/loofah< 2.19.1

🔴Vulnerability Details

3
OSV
CVE-2022-23514: Loofah is a general library for manipulating and transforming HTML/XML documents and fragments, built on top of Nokogiri2022-12-14
GHSA
Inefficient Regular Expression Complexity in Loofah2022-12-13
OSV
Inefficient Regular Expression Complexity in Loofah2022-12-13

📋Vendor Advisories

2
Red Hat
rubygem-loofah: inefficient regular expression leading to denial of service2022-12-13
Debian
CVE-2022-23514: ruby-loofah - Loofah is a general library for manipulating and transforming HTML/XML documents...2022