Lucene search

K
cvelistGitHub_MCVELIST:CVE-2022-24836
HistoryApr 11, 2022 - 12:00 a.m.

CVE-2022-24836 Inefficient Regular Expression Complexity in Nokogiri

2022-04-1100:00:00
CWE-400
CWE-1333
GitHub_M
www.cve.org
9
nokogiri
xml
html
ruby
upgrade

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

AI Score

7.7

Confidence

High

EPSS

0.005

Percentile

77.5%

Nokogiri is an open source XML and HTML library for Ruby. Nokogiri < v1.13.4 contains an inefficient regular expression that is susceptible to excessive backtracking when attempting to detect encoding in HTML documents. Users are advised to upgrade to Nokogiri >= 1.13.4. There are no known workarounds for this issue.

CNA Affected

[
  {
    "vendor": "sparklemotion",
    "product": "nokogiri",
    "versions": [
      {
        "version": "< 1.13.4",
        "status": "affected"
      }
    ]
  }
]

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

AI Score

7.7

Confidence

High

EPSS

0.005

Percentile

77.5%