The package sanitize-html before 2.7.1 are vulnerable to Regular Expression Denial of Service (ReDoS) due to insecure global regular expression replacement logic of HTML comment removal.
References
Link | Resource |
---|---|
https://github.com/apostrophecms/sanitize-html/commit/b4682c12fd30e12e82fa2d9b766de91d7d2cd23c | Patch Third Party Advisory |
https://github.com/apostrophecms/sanitize-html/pull/557 | Issue Tracking Patch Third Party Advisory |
https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-3008102 | Patch Third Party Advisory |
https://security.snyk.io/vuln/SNYK-JS-SANITIZEHTML-2957526 | Patch Third Party Advisory |
Configurations
History
08 Aug 2023, 14:22
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-1333 |
Information
Published : 2022-08-30 05:15
Updated : 2024-02-28 19:29
NVD link : CVE-2022-25887
Mitre link : CVE-2022-25887
CVE.ORG link : CVE-2022-25887
JSON object : View
Products Affected
apostrophecms
- sanitize-html
CWE
CWE-1333
Inefficient Regular Expression Complexity