GHSA-xxx9-3xcr-gjj3

Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/04/GHSA-xxx9-3xcr-gjj3/GHSA-xxx9-3xcr-gjj3.json
Published
2022-04-11T21:30:00Z
Modified
2022-08-15T09:03:01.919926Z
Details

Summary

Nokogiri v1.13.4 updates the vendored xerces:xercesImpl from 2.12.0 to 2.12.2, which addresses CVE-2022-23437. That CVE is scored as CVSS 6.5 "Medium" on the NVD record.

Please note that this advisory only applies to the JRuby implementation of Nokogiri < 1.13.4.

Mitigation

Upgrade to Nokogiri >= v1.13.4.

Impact

CVE-2022-23437 in xerces-J

  • Severity: Medium
  • Type: CWE-91 XML Injection (aka Blind XPath Injection)
  • Description: There's a vulnerability within the Apache Xerces Java (XercesJ) XML parser when handling specially crafted XML document payloads. This causes, the XercesJ XML parser to wait in an infinite loop, which may sometimes consume system resources for prolonged duration. This vulnerability is present within XercesJ version 2.12.1 and the previous versions.
  • See also: https://github.com/advisories/GHSA-h65f-jvqw-m9fj
References

Affected packages

RubyGems / nokogiri

nokogiri

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0
Fixed
1.13.4

Affected versions

1.*

1.0.0
1.0.1
1.0.2
1.0.3
1.0.4
1.0.5
1.0.6
1.0.7
1.1.0
1.1.1
1.10.0
1.10.0.rc1
1.10.1
1.10.10
1.10.2
1.10.3
1.10.4
1.10.5
1.10.6
1.10.7
1.10.8
1.10.9
1.11.0
1.11.0.rc1
1.11.0.rc2
1.11.0.rc3
1.11.0.rc4
1.11.1
1.11.2
1.11.3
1.11.4
1.11.5
1.11.6
1.11.7
1.12.0
1.12.0.rc1
1.12.1
1.12.2
1.12.3
1.12.4
1.12.5
1.13.0
1.13.1
1.13.2
1.13.3
1.2.0
1.2.1
1.2.2
1.2.3
1.3.0
1.3.1
1.3.2
1.3.3
1.4.0
1.4.1
1.4.2
1.4.2.1
1.4.3
1.4.3.1
1.4.4
1.4.4.1
1.4.4.2
1.4.5
1.4.6
1.4.7
1.5.0
1.5.0.beta.1
1.5.0.beta.2
1.5.0.beta.3
1.5.0.beta.4
1.5.1
1.5.1.rc1
1.5.10
1.5.11
1.5.2
1.5.3
1.5.3.rc2
1.5.3.rc3
1.5.3.rc4
1.5.3.rc5
1.5.3.rc6
1.5.4
1.5.4.rc1
1.5.4.rc2
1.5.4.rc3
1.5.5
1.5.5.rc1
1.5.5.rc2
1.5.5.rc3
1.5.6
1.5.6.rc1
1.5.6.rc2
1.5.6.rc3
1.5.7
1.5.7.rc1
1.5.7.rc2
1.5.7.rc3
1.5.8
1.5.9
1.6.0
1.6.0.rc1
1.6.1
1.6.2
1.6.2.1
1.6.2.rc1
1.6.2.rc2
1.6.2.rc3
1.6.3
1.6.3.1
1.6.3.rc1
1.6.3.rc2
1.6.3.rc3
1.6.4
1.6.4.1
1.6.5
1.6.6.1
1.6.6.2
1.6.6.3
1.6.6.4
1.6.7
1.6.7.1
1.6.7.2
1.6.7.rc2
1.6.7.rc3
1.6.7.rc4
1.6.8
1.6.8.1
1.6.8.rc1
1.6.8.rc2
1.6.8.rc3
1.7.0
1.7.0.1
1.7.1
1.7.2
1.8.0
1.8.1
1.8.2
1.8.3
1.8.4
1.8.5
1.9.0
1.9.0.rc1
1.9.1