CVE-2020-26247

Nokogiri is a Rubygem providing HTML, XML, SAX, and Reader parsers with XPath and CSS selector support. In Nokogiri before version 1.11.0.rc4 there is an XXE vulnerability. XML Schemas parsed by Nokogiri::XML::Schema are trusted by default, allowing external resources to be accessed over the network, potentially enabling XXE or SSRF attacks. This behavior is counter to the security policy followed by Nokogiri maintainers, which is to treat all input as untrusted by default whenever possible. This is fixed in Nokogiri version 1.11.0.rc4.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:nokogiri:nokogiri:*:*:*:*:*:ruby:*:*
cpe:2.3:a:nokogiri:nokogiri:1.11.0:rc1:*:*:*:ruby:*:*
cpe:2.3:a:nokogiri:nokogiri:1.11.0:rc2:*:*:*:ruby:*:*
cpe:2.3:a:nokogiri:nokogiri:1.11.0:rc3:*:*:*:ruby:*:*

Configuration 2 (hide)

OR cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

History

21 Nov 2024, 05:19

Type Values Removed Values Added
CVSS v2 : 4.0
v3 : 4.3
v2 : 4.0
v3 : 2.6
References () https://github.com/sparklemotion/nokogiri/commit/9c87439d9afa14a365ff13e73adc809cb2c3d97b - Patch, Third Party Advisory () https://github.com/sparklemotion/nokogiri/commit/9c87439d9afa14a365ff13e73adc809cb2c3d97b - Patch, Third Party Advisory
References () https://github.com/sparklemotion/nokogiri/releases/tag/v1.11.0.rc4 - Release Notes, Third Party Advisory () https://github.com/sparklemotion/nokogiri/releases/tag/v1.11.0.rc4 - Release Notes, Third Party Advisory
References () https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-vr8q-g5c7-m54m - Mitigation, Third Party Advisory () https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-vr8q-g5c7-m54m - Mitigation, Third Party Advisory
References () https://hackerone.com/reports/747489 - Permissions Required () https://hackerone.com/reports/747489 - Permissions Required
References () https://lists.debian.org/debian-lts-announce/2021/06/msg00007.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2021/06/msg00007.html - Mailing List, Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2022/10/msg00018.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2022/10/msg00018.html - Mailing List, Third Party Advisory
References () https://rubygems.org/gems/nokogiri - Product, Third Party Advisory () https://rubygems.org/gems/nokogiri - Product, Third Party Advisory
References () https://security.gentoo.org/glsa/202208-29 - Third Party Advisory () https://security.gentoo.org/glsa/202208-29 - Third Party Advisory

Information

Published : 2020-12-30 19:15

Updated : 2024-11-21 05:19


NVD link : CVE-2020-26247

Mitre link : CVE-2020-26247

CVE.ORG link : CVE-2020-26247


JSON object : View

Products Affected

debian

  • debian_linux

nokogiri

  • nokogiri
CWE
CWE-611

Improper Restriction of XML External Entity Reference