Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-4891— Sisimai string.rb to_plain redos

CVSS 3.5 · Low EPSS 0.32% · P55
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2022-4891

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Sisimai string.rb to_plain redos
Source: NVD (National Vulnerability Database)
Vulnerability Description
A vulnerability has been found in Sisimai up to 4.25.14p11 and classified as problematic. This vulnerability affects the function to_plain of the file lib/sisimai/string.rb. The manipulation leads to inefficient regular expression complexity. The exploit has been disclosed to the public and may be used. Upgrading to version 4.25.14p12 is able to address this issue. The name of the patch is 51fe2e6521c9c02b421b383943dc9e4bbbe65d4e. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-218452.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
Source: NVD (National Vulnerability Database)
Vulnerability Type
CWE-1333
Source: NVD (National Vulnerability Database)
Vulnerability Title
rb-sisimai 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
rb-sisimai是一个 Ruby 库,用于分析 RFC5322 退回电子邮件并根据解析结果生成结构化数据。 rb-sisimai 4.25.14p11版本及之前版本存在安全漏洞。攻击者利用该漏洞导致正则表达式复杂度降低。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-Sisimai 4.25.14p11 -

II. Public POCs for CVE-2022-4891

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2022-4891

Please Login to view more intelligence information

Same Patch Batch · n/a · 2023-01-17 · 24 CVEs total

CVE-2015-100625.5 MEDIUMgalaxy-data-resource Command Line Template injection
CVE-2022-41861SUSE Linux Enterprise Server 输入验证错误漏洞
CVE-2023-23637IMPatienT 跨站脚本漏洞
CVE-2023-22624ZOHO ManageEngine Exchange Reporter Plus 5708 代码问题漏洞
CVE-2023-0296etcd 加密问题漏洞
CVE-2023-0122Linux kernel 代码问题漏洞
CVE-2022-47929Linux kernel 代码问题漏洞
CVE-2022-47853TOTOLINK A7100RU 操作系统命令注入漏洞
CVE-2022-46891Arm Mali GPU 资源管理错误漏洞
CVE-2022-46475D-LINK DIR 645A1 缓冲区错误漏洞
CVE-2022-43977GE Grid Solutions MS3000 安全漏洞
CVE-2022-43976GE Grid Solutions MS3000 安全漏洞
CVE-2022-43975GE Grid Solutions MS3000 路径遍历漏洞
CVE-2022-41860SUSE Linux Enterprise Server 代码问题漏洞
CVE-2022-41859SUSE Linux Enterprise Server 信息泄露漏洞
CVE-2022-41858Linux kernel 代码问题漏洞
CVE-2022-4121LibEtPan 代码问题漏洞
CVE-2022-40704phoronix-test-suite 跨站脚本漏洞
CVE-2022-40319L-Soft LISTSERV 安全漏洞
CVE-2022-39195L-Soft LISTSERV 跨站脚本漏洞

Showing top 20 of 24 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2022-4891

No comments yet


Leave a comment