Description
A use-after-free in onig_new_deluxe() in regext.c in Oniguruma 6.9.2 allows attackers to potentially cause information disclosure, denial of service, or possibly code execution by providing a crafted regular expression. The attacker provides a pair of a regex pattern and a string, with a multi-byte encoding that gets handled by onig_new_deluxe(). Oniguruma issues often affect Ruby, as well as common optional libraries for PHP and Rust.
Remediation
References
Related Vulnerabilities
Django Allocation of Resources Without Limits or Throttling Vulnerability (CVE-2023-23969)
WordPress Plugin freetobook widget Unspecified Vulnerability (1.0.5)
TYPO3 URL Redirection to Untrusted Site ('Open Redirect') Vulnerability (CVE-2010-3661)
WordPress Other Vulnerability (CVE-2007-3238)
WordPress Plugin Picturesurf Gallery 'upload.php' Arbitrary File Upload (1.2)