CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:N/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H
EPSS
Percentile
72.9%
Nokogiri < v1.13.6
does not type-check all inputs into the XML and HTML4 SAX parsers. For CRuby users, this may allow specially crafted untrusted inputs to cause illegal memory access errors (segfault) or reads from unrelated memory.
The Nokogiri maintainers have evaluated this as High 8.2 (CVSS3.1).
CRuby users should upgrade to Nokogiri >= 1.13.6
.
JRuby users are not affected.
To avoid this vulnerability in affected applications, ensure the untrusted input is a String
by calling #to_s
or equivalent.
This vulnerability was responsibly reported by @agustingianni and the Github Security Lab.
seclists.org/fulldisclosure/2022/Dec/23
github.com/advisories/GHSA-xh29-r2w5-wx8m
github.com/rubysec/ruby-advisory-db/blob/master/gems/nokogiri/CVE-2022-29181.yml
github.com/sparklemotion/nokogiri/commit/db05ba9a1bd4b90aa6c76742cf6102a7c7297267
github.com/sparklemotion/nokogiri/releases/tag/v1.13.6
github.com/sparklemotion/nokogiri/security/advisories/GHSA-xh29-r2w5-wx8m
nvd.nist.gov/vuln/detail/CVE-2022-29181
security.gentoo.org/glsa/202208-29
securitylab.github.com/advisories/GHSL-2022-031_GHSL-2022-032_Nokogiri/
support.apple.com/kb/HT213532
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:N/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H
EPSS
Percentile
72.9%