A vulnerability has been found in Sisimai up to 4.25.14p11 and classified as problematic. This vulnerability affects the function to_plain
of the file lib/sisimai/string.rb. The manipulation leads to inefficient regular expression complexity. Using CWE to declare the problem leads to CWE-1333. The weakness was disclosed 01/16/2023 as 244. The advisory is shared for download at github.com.
This vulnerability was named CVE-2022-4891. The attack needs to be done within the local network. Technical details are available. Furthermore, there is an exploit available. The exploit has been disclosed to the public and may be used. The current price for an exploit might be approx. USD $0-$5k at the moment. The MITRE ATT&CK project declares the attack technique as T1449.003.
It is declared as proof-of-concept. It is possible to download the exploit at gist.githubusercontent.com. As 0-day the estimated underground price was around $0-$5k.
Upgrading to version 4.25.14p12 is able to address this issue. The updated version is ready for download at github.com. The name of the patch is 51fe2e6521c9c02b421b383943dc9e4bbbe65d4e. The bugfix is ready for download at github.com. It is recommended to upgrade the affected component. A possible mitigation has been published even before and not after the disclosure of the vulnerability.