CVE-2022-23517: Inefficient Regular Expression Complexity in rails-html-sanitizer
(updated )
Certain configurations of rails-html-sanitizer < 1.4.4 use an inefficient regular expression that is susceptible to excessive backtracking when attempting to sanitize certain SVG attributes. This may lead to a denial of service through CPU resource consumption.
References
- github.com/advisories/GHSA-5x79-w82f-gw8w
- github.com/rails/rails-html-sanitizer
- github.com/rails/rails-html-sanitizer/commit/56c61c0cebd1e493e8ad7bca2a0191609a4a6979
- github.com/rails/rails-html-sanitizer/security/advisories/GHSA-5x79-w82f-gw8w
- github.com/rubysec/ruby-advisory-db/blob/master/gems/rails-html-sanitizer/CVE-2022-23517.yml
- hackerone.com/reports/1684163
- lists.debian.org/debian-lts-announce/2023/09/msg00012.html
- lists.debian.org/debian-lts-announce/2024/09/msg00045.html
- nvd.nist.gov/vuln/detail/CVE-2022-23517
Code Behaviors & Features
Detect and mitigate CVE-2022-23517 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →