// For flags

CVE-2022-23476

Unchecked return value from xmlTextReaderExpand in Nokogiri

Severity Score

7.5
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Nokogiri is an open source XML and HTML library for the Ruby programming language. Nokogiri `1.13.8` and `1.13.9` fail to check the return value from `xmlTextReaderExpand` in the method `Nokogiri::XML::Reader#attribute_hash`. This can lead to a null pointer exception when invalid markup is being parsed. For applications using `XML::Reader` to parse untrusted inputs, this may potentially be a vector for a denial of service attack. Users are advised to upgrade to Nokogiri `>= 1.13.10`. Users may be able to search their code for calls to either `XML::Reader#attributes` or `XML::Reader#attribute_hash` to determine if they are affected.

Nokogiri es una librería XML y HTML de código abierto para el lenguaje de programación Ruby. Nokogiri `1.13.8` y `1.13.9` no pueden verificar el valor de retorno de `xmlTextReaderExpand` en el método `Nokogiri::XML::Reader#attribute_hash`. Esto puede provocar una excepción de puntero null cuando se analiza un marcado no válido. Para las aplicaciones que utilizan `XML::Reader` para analizar entradas que no son de confianza, esto puede ser potencialmente un vector para un ataque de Denegación de Servicio (DoS). Se recomienda a los usuarios actualizar a Nokogiri `>= 1.13.10`. Los usuarios pueden buscar en su código llamadas a `XML::Reader#attributes` o `XML::Reader#attribute_hash` para determinar si están afectados.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2022-01-19 CVE Reserved
  • 2022-12-08 CVE Published
  • 2024-07-29 EPSS Updated
  • 2024-08-03 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-252: Unchecked Return Value
  • CWE-476: NULL Pointer Dereference
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Nokogiri
Search vendor "Nokogiri"
Nokogiri
Search vendor "Nokogiri" for product "Nokogiri"
1.13.8
Search vendor "Nokogiri" for product "Nokogiri" and version "1.13.8"
ruby
Affected
Nokogiri
Search vendor "Nokogiri"
Nokogiri
Search vendor "Nokogiri" for product "Nokogiri"
1.13.9
Search vendor "Nokogiri" for product "Nokogiri" and version "1.13.9"
ruby
Affected