CVE-2020-26247
Nokogiri is a Rubygem providing HTML, XML, SAX, and Reader parsers with XPath and CSS selector support. In Nokogiri before version 1.11.0.rc4 there is an XXE vulnerability. XML Schemas parsed by Nokogiri::XML::Schema are trusted by default, allowing external resources to be accessed over the network, potentially enabling XXE or SSRF attacks. This behavior is counter to the security policy followed by Nokogiri maintainers, which is to treat all input as untrusted by default whenever possible. This is fixed in Nokogiri version 1.11.0.rc4.
Published
2020-12-30T19:15:12.920
Last Modified
2024-11-21T05:19:38.553
Status
Modified
Source
[email protected]
Severity
CVSSv3.1: 2.6 (LOW)
CVSSv2 Vector
AV:N/AC:L/Au:S/C:P/I:N/A:N
- Access Vector: NETWORK
- Access Complexity: LOW
- Authentication: SINGLE
- Confidentiality Impact: PARTIAL
- Integrity Impact: NONE
- Availability Impact: NONE
Exploitability Score
8.0
Impact Score
2.9
Weaknesses
-
Type: Secondary
CWE-611
-
Type: Primary
CWE-611
Affected Vendors & Products
References
-
https://github.com/sparklemotion/nokogiri/commit/9c87439d9afa14a365ff13e73adc809cb2c3d97b
Patch, Third Party Advisory
([email protected])
-
https://github.com/sparklemotion/nokogiri/releases/tag/v1.11.0.rc4
Release Notes, Third Party Advisory
([email protected])
-
https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-vr8q-g5c7-m54m
Mitigation, Third Party Advisory
([email protected])
-
https://hackerone.com/reports/747489
Permissions Required
([email protected])
-
https://lists.debian.org/debian-lts-announce/2021/06/msg00007.html
Mailing List, Third Party Advisory
([email protected])
-
https://lists.debian.org/debian-lts-announce/2022/10/msg00018.html
Mailing List, Third Party Advisory
([email protected])
-
https://rubygems.org/gems/nokogiri
Product, Third Party Advisory
([email protected])
-
https://security.gentoo.org/glsa/202208-29
Third Party Advisory
([email protected])
-
https://github.com/sparklemotion/nokogiri/commit/9c87439d9afa14a365ff13e73adc809cb2c3d97b
Patch, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://github.com/sparklemotion/nokogiri/releases/tag/v1.11.0.rc4
Release Notes, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-vr8q-g5c7-m54m
Mitigation, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://hackerone.com/reports/747489
Permissions Required
(af854a3a-2127-422b-91ae-364da2661108)
-
https://lists.debian.org/debian-lts-announce/2021/06/msg00007.html
Mailing List, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://lists.debian.org/debian-lts-announce/2022/10/msg00018.html
Mailing List, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://rubygems.org/gems/nokogiri
Product, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://security.gentoo.org/glsa/202208-29
Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)