Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2022-23476


Nokogiri is an open source XML and HTML library for the Ruby programming language. Nokogiri `1.13.8` and `1.13.9` fail to check the return value from `xmlTextReaderExpand` in the method `Nokogiri::XML::Reader#attribute_hash`. This can lead to a null pointer exception when invalid markup is being parsed. For applications using `XML::Reader` to parse untrusted inputs, this may potentially be a vector for a denial of service attack. Users are advised to upgrade to Nokogiri `>= 1.13.10`. Users may be able to search their code for calls to either `XML::Reader#attributes` or `XML::Reader#attribute_hash` to determine if they are affected.


Published

2022-12-08T04:15:09.043

Last Modified

2024-11-21T06:48:38.397

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 7.5 (HIGH)

Weaknesses
  • Type: Primary
    CWE-252
    CWE-476

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application nokogiri nokogiri 1.13.8 Yes
Application nokogiri nokogiri 1.13.9 Yes

References