Nokogiri security update v1.12.5

30 views
Skip to first unread message

Mike Dalessio

unread,
Sep 27, 2021, 3:09:13 PM9/27/21
to ruby-sec...@googlegroups.com, ruby-talk, nokogiri-talk
Nokogiri v1.12.5 was released on 2021-09-27 which contains a fix for CVE-2021-41098, fully described at https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-2rr5-8q37-2w7h. That advisory is reproduced here for your convenience.

Severity

The Nokogiri maintainers have evaluated this as High Severity 7.5 (CVSS3.0) for JRuby users. (This security advisory does not apply to CRuby users.)

Impact

In Nokogiri v1.12.4 and earlier, on JRuby only, the SAX parser resolves external entities by default.

Users of Nokogiri on JRuby who parse untrusted documents using any of these classes are affected:

  • Nokogiri::XML::SAX::Parser
  • Nokogiri::HTML4::SAX::Parser or its alias Nokogiri::HTML::SAX::Parser
  • Nokogiri::XML::SAX::PushParser
  • Nokogiri::HTML4::SAX::PushParser or its alias Nokogiri::HTML::SAX::PushParser

Mitigation

JRuby users should upgrade to Nokogiri v1.12.5 or later. There are no workarounds available for v1.12.4 or earlier.

CRuby users are not affected.

Credit

This vulnerability was reported by Andrew Crewdson.

References

CWE - CWE-611: Improper Restriction of XML External Entity Reference (4.5)

For more information


Reply all
Reply to author
Forward
0 new messages