fkie_cve-2022-28366
Vulnerability from fkie_nvd
Published
2022-04-21 23:15
Modified
2024-11-21 06:57
Severity ?
Summary
Certain Neko-related HTML parsers allow a denial of service via crafted Processing Instruction (PI) input that causes excessive heap memory consumption. In particular, this issue exists in HtmlUnit-Neko through 2.26, and is fixed in 2.27. This issue also exists in CyberNeko HTML through 1.9.22 (also affecting OWASP AntiSamy before 1.6.6), but 1.9.22 is the last version of CyberNeko HTML. NOTE: this may be related to CVE-2022-24839.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://github.com/nahsra/antisamy/releases/tag/v1.6.6 | Release Notes, Third Party Advisory | |
cve@mitre.org | https://search.maven.org/artifact/net.sourceforge.htmlunit/neko-htmlunit | Release Notes, Third Party Advisory | |
cve@mitre.org | https://sourceforge.net/projects/htmlunit/files/htmlunit/2.27/ | Release Notes, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/nahsra/antisamy/releases/tag/v1.6.6 | Release Notes, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://search.maven.org/artifact/net.sourceforge.htmlunit/neko-htmlunit | Release Notes, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://sourceforge.net/projects/htmlunit/files/htmlunit/2.27/ | Release Notes, Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cyberneko_html_project | cyberneko_html | * | |
htmlunit | htmlunit | * | |
antisamy_project | antisamy | * |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cyberneko_html_project:cyberneko_html:*:*:*:*:*:*:*:*", matchCriteriaId: "1BAE07BC-C0A2-4838-BC9D-53A085455409", versionEndIncluding: "1.9.22", vulnerable: true, }, { criteria: "cpe:2.3:a:htmlunit:htmlunit:*:*:*:*:*:*:*:*", matchCriteriaId: "6D173170-3E08-4973-9975-6B0863ACB008", versionEndExcluding: "2.27", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:antisamy_project:antisamy:*:*:*:*:*:*:*:*", matchCriteriaId: "5A45C3A9-2368-4E15-83BC-DEE9004FA9B7", versionEndExcluding: "1.6.6", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Certain Neko-related HTML parsers allow a denial of service via crafted Processing Instruction (PI) input that causes excessive heap memory consumption. In particular, this issue exists in HtmlUnit-Neko through 2.26, and is fixed in 2.27. This issue also exists in CyberNeko HTML through 1.9.22 (also affecting OWASP AntiSamy before 1.6.6), but 1.9.22 is the last version of CyberNeko HTML. NOTE: this may be related to CVE-2022-24839.", }, { lang: "es", value: "Algunos analizadores de HTML relacionados con Neko permiten una denegación de servicio a través de una entrada de instrucción de procesamiento (PI) manipulada que provoca un consumo excesivo de memoria de la pila. En particular, este problema existe en HtmlUnit-Neko hasta la versión 2.26, y se ha corregido en la 2.27. Este problema también existe en CyberNeko HTML hasta la versión 1.9.22 (también afecta a OWASP AntiSamy antes de la 1.6.6), pero la 1.9.22 es la última versión de CyberNeko HTML. NOTA: esto puede estar relacionado con CVE-2022-24839", }, ], id: "CVE-2022-28366", lastModified: "2024-11-21T06:57:13.237", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2022-04-21T23:15:10.383", references: [ { source: "cve@mitre.org", tags: [ "Release Notes", "Third Party Advisory", ], url: "https://github.com/nahsra/antisamy/releases/tag/v1.6.6", }, { source: "cve@mitre.org", tags: [ "Release Notes", "Third Party Advisory", ], url: "https://search.maven.org/artifact/net.sourceforge.htmlunit/neko-htmlunit", }, { source: "cve@mitre.org", tags: [ "Release Notes", "Third Party Advisory", ], url: "https://sourceforge.net/projects/htmlunit/files/htmlunit/2.27/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Release Notes", "Third Party Advisory", ], url: "https://github.com/nahsra/antisamy/releases/tag/v1.6.6", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Release Notes", "Third Party Advisory", ], url: "https://search.maven.org/artifact/net.sourceforge.htmlunit/neko-htmlunit", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Release Notes", "Third Party Advisory", ], url: "https://sourceforge.net/projects/htmlunit/files/htmlunit/2.27/", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-noinfo", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Log in or create an account to share your comment.
Security Advisory comment format.
This schema specifies the format of a comment related to a security advisory.
Title of the comment
Description of the comment
Loading…
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.