Thezone1975 / circleci-docs

Documentation for CircleCI.
https://circleci.com/docs/
MIT License
0 stars 1 forks source link

CVE-2019-5477 (High) detected in nokogiri-1.8.5.gem #18

Open mend-bolt-for-github[bot] opened 3 years ago

mend-bolt-for-github[bot] commented 3 years ago

CVE-2019-5477 - High Severity Vulnerability

Vulnerable Library - nokogiri-1.8.5.gem

Nokogiri (鋸) is an HTML, XML, SAX, and Reader parser. Among Nokogiri's many features is the ability to search documents via XPath or CSS3 selectors.

Library home page: https://rubygems.org/gems/nokogiri-1.8.5.gem

Path to dependency file: /circleci-docs/Gemfile.lock

Path to vulnerable library: /var/lib/gems/2.3.0/cache/nokogiri-1.8.5.gem

Dependency Hierarchy: - html-proofer-3.9.3.gem (Root Library) - :x: **nokogiri-1.8.5.gem** (Vulnerable Library)

Vulnerability Details

A command injection vulnerability in Nokogiri v1.10.3 and earlier allows commands to be executed in a subprocess via Ruby's `Kernel.open` method. Processes are vulnerable only if the undocumented method `Nokogiri::CSS::Tokenizer#load_file` is being called with unsafe user input as the filename. This vulnerability appears in code generated by the Rexical gem versions v1.0.6 and earlier. Rexical is used by Nokogiri to generate lexical scanner code for parsing CSS queries. The underlying vulnerability was addressed in Rexical v1.0.7 and Nokogiri upgraded to this version of Rexical in Nokogiri v1.10.4.

Publish Date: 2019-08-16

URL: CVE-2019-5477

CVSS 3 Score Details (9.8)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Release Date: 2019-08-16

Fix Resolution: nokogiri-v1.10.4, rexical-v1.0.7


Step up your Open Source Security Game with Mend here