CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS
Percentile
65.5%
A dependency of Nokogiri, libxslt through 1.1.33 allows bypass of a protection mechanism because callers of xsltCheckRead
and xsltCheckWrite
permit access even upon receiving a -1
error code. xsltCheckRead
can return -1
for a crafted URL that is not actually invalid and is subsequently loaded.
lists.opensuse.org/opensuse-security-announce/2019-05/msg00048.html
lists.opensuse.org/opensuse-security-announce/2019-05/msg00052.html
lists.opensuse.org/opensuse-security-announce/2019-05/msg00053.html
lists.opensuse.org/opensuse-security-announce/2019-06/msg00025.html
lists.opensuse.org/opensuse-security-announce/2019-08/msg00001.html
www.openwall.com/lists/oss-security/2019/04/22/1
www.openwall.com/lists/oss-security/2019/04/23/5
github.com/advisories/GHSA-qxcg-xjjg-66mj
github.com/rubysec/ruby-advisory-db/blob/master/gems/nokogiri/CVE-2019-11068.yml
github.com/sparklemotion/nokogiri/blob/f7aa3b0b29d6fe5fafe93dacd9b96b6b3d16b7ec/CHANGELOG.md?plain=1#L826
github.com/sparklemotion/nokogiri/commit/fe034aedcc59b566740567d621843731686676b9
github.com/sparklemotion/nokogiri/issues/1892
github.com/sparklemotion/nokogiri/pull/1898
gitlab.gnome.org/GNOME/libxslt/commit/e03553605b45c88f0b4b2980adfbbb8f6fca2fd6
lists.debian.org/debian-lts-announce/2019/04/msg00016.html
lists.fedoraproject.org/archives/list/[email protected]/message/36TEYN37XCCKN2XUMRTBBW67BPNMSW4K/
lists.fedoraproject.org/archives/list/[email protected]/message/GCOAX2IHUMKCM3ILHTMGLHCDSBTLP2JU/
lists.fedoraproject.org/archives/list/[email protected]/message/SK4YNISS22MJY22YX5I6V2U63QZAUEHA/
nvd.nist.gov/vuln/detail/CVE-2019-11068
security.netapp.com/advisory/ntap-20191017-0001/
usn.ubuntu.com/3947-1/
usn.ubuntu.com/3947-2/
www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS
Percentile
65.5%