CVE-2022-23517Regex Denial of Service in Rails Rails-html-sanitizer

Severity
7.5HIGHNVD
EPSS
0.3%
top 51.03%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 14

Description

rails-html-sanitizer is responsible for sanitizing HTML fragments in Rails applications. Certain configurations of rails-html-sanitizer < 1.4.4 use an inefficient regular expression that is susceptible to excessive backtracking when attempting to sanitize certain SVG attributes. This may lead to a denial of service through CPU resource consumption. This issue has been patched in version 1.4.4.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages4 packages

CVEListV5rails/rails-html-sanitizer< 1.4.4
RubyGemsrails/rails-html-sanitizer< 1.4.4
debiandebian/ruby-rails-html-sanitizer< ruby-rails-html-sanitizer 1.4.4-1 (bookworm)

Also affects: Debian Linux 10.0

Patches

🔴Vulnerability Details

3
OSV
CVE-2022-23517: rails-html-sanitizer is responsible for sanitizing HTML fragments in Rails applications2022-12-14
OSV
Inefficient Regular Expression Complexity in rails-html-sanitizer2022-12-13
GHSA
Inefficient Regular Expression Complexity in rails-html-sanitizer2022-12-13

📋Vendor Advisories

2
Red Hat
rubygem-rails-html-sanitizer: Inefficient Regular Expression leading to denial of service2022-12-13
Debian
CVE-2022-23517: ruby-rails-html-sanitizer - rails-html-sanitizer is responsible for sanitizing HTML fragments in Rails appli...2022