gsd-2022-28366
Vulnerability from gsd
Modified
2023-12-13 01:19
Details
Certain Neko-related HTML parsers allow a denial of service via crafted Processing Instruction (PI) input that causes excessive heap memory consumption. In particular, this issue exists in HtmlUnit-Neko through 2.26, and is fixed in 2.27. This issue also exists in CyberNeko HTML through 1.9.22 (also affecting OWASP AntiSamy before 1.6.6), but 1.9.22 is the last version of CyberNeko HTML. NOTE: this may be related to CVE-2022-24839.
Aliases
Aliases



{
  "GSD": {
    "alias": "CVE-2022-28366",
    "description": "Certain Neko-related HTML parsers allow a denial of service via crafted Processing Instruction (PI) input that causes excessive heap memory consumption. In particular, this issue exists in HtmlUnit-Neko through 2.26, and is fixed in 2.27. This issue also exists in CyberNeko HTML through 1.9.22 (also affecting OWASP AntiSamy before 1.6.6), but 1.9.22 is the last version of CyberNeko HTML. NOTE: this may be related to CVE-2022-24939.",
    "id": "GSD-2022-28366",
    "references": [
      "https://www.suse.com/security/cve/CVE-2022-28366.html"
    ]
  },
  "gsd": {
    "metadata": {
      "exploitCode": "unknown",
      "remediation": "unknown",
      "reportConfidence": "confirmed",
      "type": "vulnerability"
    },
    "osvSchema": {
      "aliases": [
        "CVE-2022-28366"
      ],
      "details": "Certain Neko-related HTML parsers allow a denial of service via crafted Processing Instruction (PI) input that causes excessive heap memory consumption. In particular, this issue exists in HtmlUnit-Neko through 2.26, and is fixed in 2.27. This issue also exists in CyberNeko HTML through 1.9.22 (also affecting OWASP AntiSamy before 1.6.6), but 1.9.22 is the last version of CyberNeko HTML. NOTE: this may be related to CVE-2022-24839.",
      "id": "GSD-2022-28366",
      "modified": "2023-12-13T01:19:34.550785Z",
      "schema_version": "1.4.0"
    }
  },
  "namespaces": {
    "cve.org": {
      "CVE_data_meta": {
        "ASSIGNER": "cve@mitre.org",
        "ID": "CVE-2022-28366",
        "STATE": "PUBLIC"
      },
      "affects": {
        "vendor": {
          "vendor_data": [
            {
              "product": {
                "product_data": [
                  {
                    "product_name": "n/a",
                    "version": {
                      "version_data": [
                        {
                          "version_value": "n/a"
                        }
                      ]
                    }
                  }
                ]
              },
              "vendor_name": "n/a"
            }
          ]
        }
      },
      "data_format": "MITRE",
      "data_type": "CVE",
      "data_version": "4.0",
      "description": {
        "description_data": [
          {
            "lang": "eng",
            "value": "Certain Neko-related HTML parsers allow a denial of service via crafted Processing Instruction (PI) input that causes excessive heap memory consumption. In particular, this issue exists in HtmlUnit-Neko through 2.26, and is fixed in 2.27. This issue also exists in CyberNeko HTML through 1.9.22 (also affecting OWASP AntiSamy before 1.6.6), but 1.9.22 is the last version of CyberNeko HTML. NOTE: this may be related to CVE-2022-24839."
          }
        ]
      },
      "problemtype": {
        "problemtype_data": [
          {
            "description": [
              {
                "lang": "eng",
                "value": "n/a"
              }
            ]
          }
        ]
      },
      "references": {
        "reference_data": [
          {
            "name": "https://github.com/nahsra/antisamy/releases/tag/v1.6.6",
            "refsource": "MISC",
            "url": "https://github.com/nahsra/antisamy/releases/tag/v1.6.6"
          },
          {
            "name": "https://search.maven.org/artifact/net.sourceforge.htmlunit/neko-htmlunit",
            "refsource": "MISC",
            "url": "https://search.maven.org/artifact/net.sourceforge.htmlunit/neko-htmlunit"
          },
          {
            "name": "https://sourceforge.net/projects/htmlunit/files/htmlunit/2.27/",
            "refsource": "MISC",
            "url": "https://sourceforge.net/projects/htmlunit/files/htmlunit/2.27/"
          }
        ]
      }
    },
    "gitlab.com": {
      "advisories": [
        {
          "affected_range": "(,2.27)",
          "affected_versions": "All versions before 2.27",
          "cvss_v2": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "cvss_v3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "cwe_ids": [
            "CWE-1035",
            "CWE-937"
          ],
          "date": "2022-10-28",
          "description": "Certain Neko-related HTML parsers allow a denial of service via crafted Processing Instruction (PI) input that causes excessive heap memory consumption. In particular, this issue exists in HtmlUnit-Neko through 2.26, and is fixed in 2.27. This issue also exists in CyberNeko HTML through 1.9.22 (also affecting OWASP AntiSamy before 1.6.6), but 1.9.22 is the last version of CyberNeko HTML. NOTE: this may be related to CVE-2022-24939.",
          "fixed_versions": [
            "2.27"
          ],
          "identifier": "CVE-2022-28366",
          "identifiers": [
            "CVE-2022-28366"
          ],
          "not_impacted": "",
          "package_slug": "maven/net.sourceforge.htmlunit/htmlunit",
          "pubdate": "2022-04-21",
          "solution": "Upgrade to version 2.27 or above.",
          "title": "Uncontrolled Resource Consumption",
          "urls": [
            "https://nvd.nist.gov/vuln/detail/CVE-2022-28366",
            "https://github.com/nahsra/antisamy/releases/tag/v1.6.6",
            "https://sourceforge.net/projects/htmlunit/files/htmlunit/2.27/",
            "https://search.maven.org/artifact/net.sourceforge.htmlunit/neko-htmlunit"
          ],
          "uuid": "5bf65776-db47-472a-b1c5-1b4fd20155f9"
        },
        {
          "affected_range": "(,2.27)",
          "affected_versions": "All versions before 2.27",
          "cwe_ids": [
            "CWE-1035",
            "CWE-937"
          ],
          "date": "2022-04-26",
          "description": "Certain Neko-related HTML parsers allow a denial of service via crafted Processing Instruction (PI) input that causes excessive heap memory consumption. In particular, this issue exists in HtmlUnit-Neko through 2.26, and is fixed in 2.27. This issue also exists in CyberNeko HTML through 1.9.22 (also affecting OWASP AntiSamy before 1.6.6), but 1.9.22 is the last version of CyberNeko HTML. NOTE: this may be related to CVE-2022-24939.",
          "fixed_versions": [
            "2.27"
          ],
          "identifier": "CVE-2022-28366",
          "identifiers": [
            "GHSA-g9hh-vvx3-v37v",
            "CVE-2022-28366"
          ],
          "not_impacted": "All versions starting from 2.27",
          "package_slug": "maven/net.sourceforge.htmlunit/neko-htmlunit",
          "pubdate": "2022-04-23",
          "solution": "Upgrade to version 2.27 or above.",
          "title": "Denial of service in HtmlUnit-Neko",
          "urls": [
            "https://nvd.nist.gov/vuln/detail/CVE-2022-28366",
            "https://github.com/nahsra/antisamy/releases/tag/v1.6.6",
            "https://search.maven.org/artifact/net.sourceforge.htmlunit/neko-htmlunit",
            "https://sourceforge.net/projects/htmlunit/files/htmlunit/2.27/",
            "https://github.com/advisories/GHSA-g9hh-vvx3-v37v"
          ],
          "uuid": "53a28b2c-0e8f-4ec1-831e-03eff3b46d9b"
        },
        {
          "affected_range": "(,1.6.6)",
          "affected_versions": "All versions before 1.6.6",
          "cvss_v2": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "cvss_v3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "cwe_ids": [
            "CWE-1035",
            "CWE-937"
          ],
          "date": "2022-10-28",
          "description": "Certain Neko-related HTML parsers allow a denial of service via crafted Processing Instruction (PI) input that causes excessive heap memory consumption. In particular, this issue exists in HtmlUnit-Neko through 2.26, and is fixed in 2.27. This issue also exists in CyberNeko HTML through 1.9.22 (also affecting OWASP AntiSamy before 1.6.6), but 1.9.22 is the last version of CyberNeko HTML. NOTE: this may be related to CVE-2022-24939.",
          "fixed_versions": [
            "1.6.6"
          ],
          "identifier": "CVE-2022-28366",
          "identifiers": [
            "CVE-2022-28366"
          ],
          "not_impacted": "",
          "package_slug": "maven/org.owasp.antisamy/antisamy",
          "pubdate": "2022-04-21",
          "solution": "Upgrade to version 1.6.6 or above.",
          "title": "Uncontrolled Resource Consumption",
          "urls": [
            "https://nvd.nist.gov/vuln/detail/CVE-2022-28366",
            "https://github.com/nahsra/antisamy/releases/tag/v1.6.6",
            "https://sourceforge.net/projects/htmlunit/files/htmlunit/2.27/",
            "https://search.maven.org/artifact/net.sourceforge.htmlunit/neko-htmlunit"
          ],
          "uuid": "961d73c2-c1e8-4e13-8806-2e1f3740aa85"
        }
      ]
    },
    "nvd.nist.gov": {
      "configurations": {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:cyberneko_html_project:cyberneko_html:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "1.9.22",
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:htmlunit:htmlunit:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndExcluding": "2.27",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          },
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:antisamy_project:antisamy:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndExcluding": "1.6.6",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      },
      "cve": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2022-28366"
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "en",
              "value": "Certain Neko-related HTML parsers allow a denial of service via crafted Processing Instruction (PI) input that causes excessive heap memory consumption. In particular, this issue exists in HtmlUnit-Neko through 2.26, and is fixed in 2.27. This issue also exists in CyberNeko HTML through 1.9.22 (also affecting OWASP AntiSamy before 1.6.6), but 1.9.22 is the last version of CyberNeko HTML. NOTE: this may be related to CVE-2022-24839."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "en",
                  "value": "NVD-CWE-noinfo"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://github.com/nahsra/antisamy/releases/tag/v1.6.6",
              "refsource": "MISC",
              "tags": [
                "Release Notes",
                "Third Party Advisory"
              ],
              "url": "https://github.com/nahsra/antisamy/releases/tag/v1.6.6"
            },
            {
              "name": "https://sourceforge.net/projects/htmlunit/files/htmlunit/2.27/",
              "refsource": "MISC",
              "tags": [
                "Release Notes",
                "Third Party Advisory"
              ],
              "url": "https://sourceforge.net/projects/htmlunit/files/htmlunit/2.27/"
            },
            {
              "name": "https://search.maven.org/artifact/net.sourceforge.htmlunit/neko-htmlunit",
              "refsource": "MISC",
              "tags": [
                "Release Notes",
                "Third Party Advisory"
              ],
              "url": "https://search.maven.org/artifact/net.sourceforge.htmlunit/neko-htmlunit"
            }
          ]
        }
      },
      "impact": {
        "baseMetricV2": {
          "acInsufInfo": false,
          "cvssV2": {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          "exploitabilityScore": 10.0,
          "impactScore": 2.9,
          "obtainAllPrivilege": false,
          "obtainOtherPrivilege": false,
          "obtainUserPrivilege": false,
          "severity": "MEDIUM",
          "userInteractionRequired": false
        },
        "baseMetricV3": {
          "cvssV3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "exploitabilityScore": 3.9,
          "impactScore": 3.6
        }
      },
      "lastModifiedDate": "2023-12-07T17:56Z",
      "publishedDate": "2022-04-21T23:15Z"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading...

Loading...

Loading...

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.