Sha256: a82e27698af7bbc5bc1fc3d7d87226c9136188f4fd4fbae1268489f8325a05f5

Contents?: true

Size: 1.19 KB

Versions: 1

Compression:

Stored size: 1.19 KB

Contents

---
gem: nokogiri
cve: 2019-5477
date: 2019-08-11
url: https://github.com/sparklemotion/nokogiri/issues/1915
title: Nokogiri Command Injection Vulnerability via Nokogiri::CSS::Tokenizer#load_file
description: |
  A command injection vulnerability in Nokogiri v1.10.3 and earlier allows
  commands to be executed in a subprocess by Ruby's `Kernel.open` method.
  Processes are vulnerable only if the undocumented method
  `Nokogiri::CSS::Tokenizer#load_file` is being passed untrusted user input.

  This vulnerability appears in code generated by the Rexical gem versions
  v1.0.6 and earlier. Rexical is used by Nokogiri to generate lexical scanner
  code for parsing CSS queries. The underlying vulnerability was addressed in
  Rexical v1.0.7 and Nokogiri upgraded to this version of Rexical in
  Nokogiri v1.10.4.

  Upgrade to Nokogiri v1.10.4, or avoid calling the undocumented method
  `Nokogiri::CSS::Tokenizer#load_file` with untrusted user input.

patched_versions:
  - ">= 1.10.4"

cvss_v2: 7.5
cvss_v3: 9.8

related:
  url:
    - https://github.com/tenderlove/rexical/commit/a652474dbc66be350055db3e8f9b3a7b3fd75926
    - https://groups.google.com/forum/#!msg/ruby-security-ann/YMnKFsASOAE/Fw3ocLI0BQAJ

Version data entries

1 entries across 1 versions & 1 rubygems

Version Path
bundler-audit-0.7.0.1 data/ruby-advisory-db/gems/nokogiri/CVE-2019-5477.yml