Lucene search

K
githubGitHub Advisory DatabaseGHSA-5X79-W82F-GW8W
HistoryDec 13, 2022 - 5:43 p.m.

Inefficient Regular Expression Complexity in rails-html-sanitizer

2022-12-1317:43:02
CWE-1333
GitHub Advisory Database
github.com
17
rails-html-sanitizer
regex
denial of service
mitigation
high severity
cwe-1333
vulnerability detection

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

EPSS

0.001

Percentile

50.5%

Summary

Certain configurations of rails-html-sanitizer < 1.4.4 use an inefficient regular expression that is susceptible to excessive backtracking when attempting to sanitize certain SVG attributes. This may lead to a denial of service through CPU resource consumption.

Mitigation

Upgrade to rails-html-sanitizer >= 1.4.4.

Severity

The maintainers have evaluated this as High Severity 7.5 (CVSS3.1).

References

Credit

This vulnerability was responsibly reported by @ooooooo-q (https://github.com/ooooooo-q).

Affected configurations

Vulners
Node
typo3html_sanitizerRange<1.4.4
VendorProductVersionCPE
typo3html_sanitizer*cpe:2.3:a:typo3:html_sanitizer:*:*:*:*:*:*:*:*

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

EPSS

0.001

Percentile

50.5%