Unknown
CVE-2022-23476
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below:
Add References:
CVE-2022-23476
MITRE ATT&CK
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Topic Tags
Description
Nokogiri is an open source XML and HTML library for the Ruby programming language. Nokogiri 1.13.8
and 1.13.9
fail to check the return value from xmlTextReaderExpand
in the method Nokogiri::XML::Reader#attribute_hash
. This can lead to a null pointer exception when invalid markup is being parsed. For applications using XML::Reader
to parse untrusted inputs, this may potentially be a vector for a denial of service attack. Users are advised to upgrade to Nokogiri >= 1.13.10
. Users may be able to search their code for calls to either XML::Reader#attributes
or XML::Reader#attribute_hash
to determine if they are affected.
Add Assessment
No one has assessed this topic. Be the first to add your voice to the community.
CVSS V3 Severity and Metrics
General Information
Vendors
- nokogiri
Products
- nokogiri 1.13.8,
- nokogiri 1.13.9
References
Additional Info
Technical Analysis
Report as Emergent Threat Response
Report as Exploited in the Wild
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below: