Nokogiri < v1.13.6
does not type-check all inputs into the XML and HTML4 SAX parsers. For CRuby users, this may allow specially crafted untrusted inputs to cause illegal memory access errors (segfault) or reads from unrelated memory.
The Nokogiri maintainers have evaluated this as High 8.2 (CVSS3.1).
CRuby users should upgrade to Nokogiri >= 1.13.6
.
JRuby users are not affected.
To avoid this vulnerability in affected applications, ensure the untrusted input is a String
by calling #to_s
or equivalent.
This vulnerability was responsibly reported by @agustingianni and the Github Security Lab.
{ "nvd_published_at": "2022-05-20T19:15:00Z", "cwe_ids": [ "CWE-241", "CWE-843" ], "severity": "HIGH", "github_reviewed": true, "github_reviewed_at": "2022-05-23T23:15:15Z" }