Vulnerability Description
Loofah is a general library for manipulating and transforming HTML/XML documents and fragments, built on top of Nokogiri. Loofah < 2.19.1 contains an inefficient regular expression that is susceptible to excessive backtracking when attempting to sanitize certain SVG attributes. This may lead to a denial of service through CPU resource consumption. This issue is patched in version 2.19.1.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Loofah Project | Loofah | < 2.19.1 |
Related Weaknesses (CWE)
References
- https://github.com/flavorjones/loofah/security/advisories/GHSA-486f-hjj9-9vhhThird Party Advisory
- https://hackerone.com/reports/1684163Permissions RequiredThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2023/09/msg00011.html
- https://github.com/flavorjones/loofah/security/advisories/GHSA-486f-hjj9-9vhhThird Party Advisory
- https://hackerone.com/reports/1684163Permissions RequiredThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2023/09/msg00011.html
- https://lists.debian.org/debian-lts-announce/2024/09/msg00044.html
FAQ
What is CVE-2022-23514?
CVE-2022-23514 is a vulnerability with a CVSS score of 7.5 (HIGH). Loofah is a general library for manipulating and transforming HTML/XML documents and fragments, built on top of Nokogiri. Loofah < 2.19.1 contains an inefficient regular expression that is susceptible...
How severe is CVE-2022-23514?
CVE-2022-23514 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-23514?
Check the references section above for vendor advisories and patch information. Affected products include: Loofah Project Loofah.