Nokogiri < v1.13.6
does not type-check all inputs into the XML and HTML4 SAX parsers. For CRuby users, this may allow specially crafted untrusted inputs to cause illegal memory access errors (segfault) or reads from unrelated memory.
The Nokogiri maintainers have evaluated this as High 8.2 (CVSS3.1).
CRuby users should upgrade to Nokogiri >= 1.13.6
.
JRuby users are not affected.
To avoid this vulnerability in affected applications, ensure the untrusted input is a String
by calling #to_s
or equivalent.
This vulnerability was responsibly reported by @agustingianni and the Github Security Lab.
seclists.org/fulldisclosure/2022/Dec/23
github.com/rubysec/ruby-advisory-db/blob/master/gems/nokogiri/CVE-2022-29181.yml
github.com/sparklemotion/nokogiri
github.com/sparklemotion/nokogiri/commit/db05ba9a1bd4b90aa6c76742cf6102a7c7297267
github.com/sparklemotion/nokogiri/releases/tag/v1.13.6
github.com/sparklemotion/nokogiri/security/advisories/GHSA-xh29-r2w5-wx8m
nvd.nist.gov/vuln/detail/CVE-2022-29181
security.gentoo.org/glsa/202208-29
securitylab.github.com/advisories/GHSL-2022-031_GHSL-2022-032_Nokogiri
support.apple.com/kb/HT213532