Lucene search

K
cvelistGitHub_MCVELIST:CVE-2022-29181
HistoryMay 20, 2022 - 12:00 a.m.

CVE-2022-29181 Improper Handling of Unexpected Data Type in Nokogiri

2022-05-2000:00:00
CWE-241
GitHub_M
www.cve.org
1

8.2 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H

8.2 High

AI Score

Confidence

High

0.003 Low

EPSS

Percentile

68.8%

Nokogiri is an open source XML and HTML library for Ruby. Nokogiri prior to version 1.13.6 does not type-check all inputs into the XML and HTML4 SAX parsers, allowing specially crafted untrusted inputs to cause illegal memory access errors (segfault) or reads from unrelated memory. Version 1.13.6 contains a patch for this issue. As a workaround, ensure the untrusted input is a String by calling #to_s or equivalent.

CNA Affected

[
  {
    "vendor": "sparklemotion",
    "product": "nokogiri",
    "versions": [
      {
        "version": "< 1.13.6",
        "status": "affected"
      }
    ]
  }
]

8.2 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H

8.2 High

AI Score

Confidence

High

0.003 Low

EPSS

Percentile

68.8%