CVE-2022-23476

HIGH

Nokogiri < 1.13.10 - Denial of Service

Title source: rule
STIX 2.1

Description

Nokogiri is an open source XML and HTML library for the Ruby programming language. Nokogiri `1.13.8` and `1.13.9` fail to check the return value from `xmlTextReaderExpand` in the method `Nokogiri::XML::Reader#attribute_hash`. This can lead to a null pointer exception when invalid markup is being parsed. For applications using `XML::Reader` to parse untrusted inputs, this may potentially be a vector for a denial of service attack. Users are advised to upgrade to Nokogiri `>= 1.13.10`. Users may be able to search their code for calls to either `XML::Reader#attributes` or `XML::Reader#attribute_hash` to determine if they are affected.

Scores

CVSS v3 7.5
EPSS 0.0023
EPSS Percentile 45.3%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

CISA SSVC

Vulnrichment
Exploitation none
Automatable yes
Technical Impact partial

Details

CWE
CWE-252 CWE-476
Status published
Products (3)
nokogiri/nokogiri 1.13.8
nokogiri/nokogiri 1.13.9
rubygems/nokogiri 1.13.8 - 1.13.10RubyGems
Published Dec 08, 2022
Tracked Since Feb 18, 2026