Name | CVE-2022-25887 |
Description | The package sanitize-html before 2.7.1 are vulnerable to Regular Expression Denial of Service (ReDoS) due to insecure global regular expression replacement logic of HTML comment removal. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Debian Bugs | 1019219 |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
node-sanitize-html (PTS) | bookworm | 2.8.0+~2.6.2-1 | fixed |
| sid, trixie | 2.14.0+~2.13.0-1 | fixed |
The information below is based on the following data on fixed versions.
Notes
https://github.com/apostrophecms/sanitize-html/commit/b4682c12fd30e12e82fa2d9b766de91d7d2cd23c (2.7.1)
https://github.com/apostrophecms/sanitize-html/pull/557
https://security.snyk.io/vuln/SNYK-JS-SANITIZEHTML-2957526