4 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:L/Au:S/C:P/I:N/A:N
4.3 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
0.002 Low
EPSS
Percentile
53.1%
Nokogiri is a Rubygem providing HTML, XML, SAX, and Reader parsers with
XPath and CSS selector support. In Nokogiri before version 1.11.0.rc4 there
is an XXE vulnerability. XML Schemas parsed by Nokogiri::XML::Schema are
trusted by default, allowing external resources to be accessed over the
network, potentially enabling XXE or SSRF attacks. This behavior is counter
to the security policy followed by Nokogiri maintainers, which is to treat
all input as untrusted by default whenever possible. This is fixed in
Nokogiri version 1.11.0.rc4.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 18.04 | noarch | ruby-nokogiri | < any | UNKNOWN |
ubuntu | 20.04 | noarch | ruby-nokogiri | < any | UNKNOWN |
ubuntu | 22.04 | noarch | ruby-nokogiri | < any | UNKNOWN |
ubuntu | 23.10 | noarch | ruby-nokogiri | < any | UNKNOWN |
ubuntu | 24.04 | noarch | ruby-nokogiri | < any | UNKNOWN |
ubuntu | 14.04 | noarch | ruby-nokogiri | < any | UNKNOWN |
ubuntu | 16.04 | noarch | ruby-nokogiri | < any | UNKNOWN |
github.com/sparklemotion/nokogiri/commit/9c87439d9afa14a365ff13e73adc809cb2c3d97b
github.com/sparklemotion/nokogiri/commit/9c87439d9afa14a365ff13e73adc809cb2c3d97b (v1.11.0.rc4)
github.com/sparklemotion/nokogiri/releases/tag/v1.11.0.rc4
github.com/sparklemotion/nokogiri/security/advisories/GHSA-vr8q-g5c7-m54m
hackerone.com/reports/747489
launchpad.net/bugs/cve/CVE-2020-26247
nvd.nist.gov/vuln/detail/CVE-2020-26247
rubygems.org/gems/nokogiri
security-tracker.debian.org/tracker/CVE-2020-26247
www.cve.org/CVERecord?id=CVE-2020-26247
4 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:L/Au:S/C:P/I:N/A:N
4.3 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
0.002 Low
EPSS
Percentile
53.1%