The package sanitize-html before 2.7.1 are vulnerable to Regular Expression Denial of Service (ReDoS) due to insecure global regular expression replacement logic of HTML comment removal.
References
Link | Resource |
---|---|
https://github.com/apostrophecms/sanitize-html/commit/b4682c12fd30e12e82fa2d9b766de91d7d2cd23c | Patch Third Party Advisory |
https://github.com/apostrophecms/sanitize-html/pull/557 | Issue Tracking Patch Third Party Advisory |
https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-3008102 | Patch Third Party Advisory |
https://security.snyk.io/vuln/SNYK-JS-SANITIZEHTML-2957526 | Patch Third Party Advisory |
Configurations
History
No history.
Information
Published : 2022-08-30 05:15
Updated : 2023-08-08 14:22
NVD link : CVE-2022-25887
Mitre link : CVE-2022-25887
CVE.ORG link : CVE-2022-25887
JSON object : View
Products Affected
apostrophecms
- sanitize-html
CWE
CWE-1333
Inefficient Regular Expression Complexity