Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2022-23476

Опубликовано: 08 дек. 2022
Источник: redhat
CVSS3: 7.5

Описание

Nokogiri is an open source XML and HTML library for the Ruby programming language. Nokogiri 1.13.8 and 1.13.9 fail to check the return value from xmlTextReaderExpand in the method Nokogiri::XML::Reader#attribute_hash. This can lead to a null pointer exception when invalid markup is being parsed. For applications using XML::Reader to parse untrusted inputs, this may potentially be a vector for a denial of service attack. Users are advised to upgrade to Nokogiri >= 1.13.10. Users may be able to search their code for calls to either XML::Reader#attributes or XML::Reader#attribute_hash to determine if they are affected.

A denial of service flaw was found in rubygem-nokogiri. When parsing invalid markup, a NULL pointer exception may occur, which is a potential vector for a denial of service attack.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
CloudForms Management Engine 5rubygem-nokogiriNot affected
Red Hat 3scale API Management Platform 23scale-amp-backend-containerNot affected
Red Hat 3scale API Management Platform 23scale-amp-zync-containerNot affected
Red Hat 3scale API Management Platform 23scale-toolbox-containerNot affected
Red Hat Ceph Storage 6rocksdbAffected
Red Hat Ceph Storage 7rocksdbAffected
Red Hat Ceph Storage 8rocksdbAffected
Red Hat Satellite 6satellite-capsule:el8/rubygem-nokogiriNot affected
Red Hat Satellite 6satellite:el8/rubygem-amazing_printNot affected
Red Hat Satellite 6satellite:el8/rubygem-nokogiriNot affected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-252
Дефект:
CWE-476
https://bugzilla.redhat.com/show_bug.cgi?id=2153279rubygem-nokogiri: Denial of service

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
ubuntu
почти 3 года назад

Nokogiri is an open source XML and HTML library for the Ruby programming language. Nokogiri `1.13.8` and `1.13.9` fail to check the return value from `xmlTextReaderExpand` in the method `Nokogiri::XML::Reader#attribute_hash`. This can lead to a null pointer exception when invalid markup is being parsed. For applications using `XML::Reader` to parse untrusted inputs, this may potentially be a vector for a denial of service attack. Users are advised to upgrade to Nokogiri `>= 1.13.10`. Users may be able to search their code for calls to either `XML::Reader#attributes` or `XML::Reader#attribute_hash` to determine if they are affected.

CVSS3: 7.5
nvd
почти 3 года назад

Nokogiri is an open source XML and HTML library for the Ruby programming language. Nokogiri `1.13.8` and `1.13.9` fail to check the return value from `xmlTextReaderExpand` in the method `Nokogiri::XML::Reader#attribute_hash`. This can lead to a null pointer exception when invalid markup is being parsed. For applications using `XML::Reader` to parse untrusted inputs, this may potentially be a vector for a denial of service attack. Users are advised to upgrade to Nokogiri `>= 1.13.10`. Users may be able to search their code for calls to either `XML::Reader#attributes` or `XML::Reader#attribute_hash` to determine if they are affected.

CVSS3: 7.5
debian
почти 3 года назад

Nokogiri is an open source XML and HTML library for the Ruby programmi ...

CVSS3: 7.5
github
почти 3 года назад

Unchecked return value from xmlTextReaderExpand

CVSS3: 7.5
redos
около 2 лет назад

Множественные уязвимости Puppet

7.5 High

CVSS3