NA

CVE-2022-23476

Published: 08/12/2022 Updated: 10/12/2022
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 0

Vulnerability Summary

Nokogiri is an open source XML and HTML library for the Ruby programming language. Nokogiri `1.13.8` and `1.13.9` fail to check the return value from `xmlTextReaderExpand` in the method `Nokogiri::XML::Reader#attribute_hash`. This can lead to a null pointer exception when invalid markup is being parsed. For applications using `XML::Reader` to parse untrusted inputs, this may potentially be a vector for a denial of service attack. Users are advised to upgrade to Nokogiri `>= 1.13.10`. Users may be able to search their code for calls to either `XML::Reader#attributes` or `XML::Reader#attribute_hash` to determine if they are affected.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

nokogiri nokogiri 1.13.9

nokogiri nokogiri 1.13.8

Vendor Advisories

Description<!---->A denial of service flaw was found in rubygem-nokogiri When parsing invalid markup, a NULL pointer exception may occur, which is a potential vector for a denial of service attackA denial of service flaw was found in rubygem-nokogiri When parsing invalid markup, a NULL pointer exception may occur, which is a potential vector for ...