Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2022-23516
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Uncontrolled Recursion in Loofah
Source: NVD (National Vulnerability Database)
Vulnerability Description
Loofah is a general library for manipulating and transforming HTML/XML documents and fragments, built on top of Nokogiri. Loofah >= 2.2.0, < 2.19.1 uses recursion for sanitizing CDATA sections, making it susceptible to stack exhaustion and raising a SystemStackError exception. This may lead to a denial of service through CPU resource consumption. This issue is patched in version 2.19.1. Users who are unable to upgrade may be able to mitigate this vulnerability by limiting the length of the strings that are sanitized.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
未经控制的递归
Source: NVD (National Vulnerability Database)
Vulnerability Title
Loofah gem for Ruby 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Loofah gem for Ruby是一款基于Ruby的、用于处理和转换HTML/XML文档的库。 Loofah gem for Ruby 2.19.1到 2.2.0版本存在安全漏洞,该漏洞源于使用递归来清理CDATA部分,使其容易出现堆栈耗尽并引发SystemStackError异常,这可能会因 CPU 资源消耗而导致拒绝服务。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
flavorjonesloofah >= 2.2.0, < 2.19.1 -
II. Public POCs for CVE-2022-23516
#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2022-23516
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2022-23516

No comments yet


Leave a comment