7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
0.001 Low
EPSS
Percentile
41.8%
Loofah >= 2.2.0, < 2.19.1
uses recursion for sanitizing CDATA
sections, making it susceptible to stack exhaustion and raising a SystemStackError
exception. This may lead to a denial of service through CPU resource consumption.
Upgrade to Loofah >= 2.19.1
.
Users who are unable to upgrade may be able to mitigate this vulnerability by limiting the length of the strings that are sanitized.
The Loofah maintainers have evaluated this as High Severity 7.5 (CVSS3.1).
github.com/advisories/GHSA-3x8r-x6xp-q4vm
github.com/flavorjones/loofah/commit/86f7f6364491b0099d215db858ecdc0c89ded040
github.com/flavorjones/loofah/security/advisories/GHSA-3x8r-x6xp-q4vm
github.com/rubysec/ruby-advisory-db/blob/master/gems/loofah/CVE-2022-23516.yml
lists.debian.org/debian-lts-announce/2023/09/msg00011.html
nvd.nist.gov/vuln/detail/CVE-2022-23516