Description
Nokogiri is a Rubygem providing HTML, XML, SAX, and Reader parsers with XPath and CSS selector support. In Nokogiri before version 1.11.0.rc4 there is an XXE vulnerability. XML Schemas parsed by Nokogiri::XML::Schema are trusted by default, allowing external resources to be accessed over the network, potentially enabling XXE or SSRF attacks. This behavior is counter to the security policy followed by Nokogiri maintainers, which is to treat all input as untrusted by default whenever possible. This is fixed in Nokogiri version 1.11.0.rc4.
References (8)
Core 8
Core References
Mailing List, Third Party Advisory mailing-list
https://lists.debian.org/debian-lts-announce/2021/06/msg00007.html
Third Party Advisory vendor-advisory
https://security.gentoo.org/glsa/202208-29
Mailing List, Third Party Advisory mailing-list
https://lists.debian.org/debian-lts-announce/2022/10/msg00018.html
Patch, Third Party Advisory
https://github.com/sparklemotion/nokogiri/commit/9c87439d9afa14a365ff13e73adc809cb2c3d97b
Release Notes, Third Party Advisory
https://github.com/sparklemotion/nokogiri/releases/tag/v1.11.0.rc4
Mitigation, Third Party Advisory
https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-vr8q-g5c7-m54m
Permissions Required
https://hackerone.com/reports/747489
Product, Third Party Advisory
https://rubygems.org/gems/nokogiri
Scores
CVSS v3
2.6
EPSS
0.0072
EPSS Percentile
72.5%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N
Details
CWE
CWE-611
Status
published
Products (5)
debian/debian_linux
9.0
debian/debian_linux
10.0
nokogiri/nokogiri
1.11.0 rc1 (3 CPE variants)
nokogiri/nokogiri
< 1.11.0
rubygems/nokogiri
0 - 1.11.0RubyGems
Published
Dec 30, 2020
Tracked Since
Feb 18, 2026