madhon / madhon.github.io

Website
0 stars 0 forks source link

CVE-2017-18258 (Medium) detected in nokogiri-1.6.7.2.gem #11

Closed mend-bolt-for-github[bot] closed 3 years ago

mend-bolt-for-github[bot] commented 3 years ago

CVE-2017-18258 - Medium Severity Vulnerability

Vulnerable Library - nokogiri-1.6.7.2.gem

Nokogiri (鋸) is an HTML, XML, SAX, and Reader parser. Among Nokogiri's many features is the ability to search documents via XPath or CSS3 selectors. XML is like violence - if it doesn’t solve your problems, you are not using enough of it.

Library home page: https://rubygems.org/gems/nokogiri-1.6.7.2.gem

Path to dependency file: /madhon.github.io/Gemfile.lock

Path to vulnerable library: /var/lib/gems/2.3.0/cache/nokogiri-1.6.7.2-x86-mingw32.gem

Dependency Hierarchy: - github-pages-44.gem (Root Library) - jemoji-0.5.1.gem - html-pipeline-2.3.0.gem - :x: **nokogiri-1.6.7.2.gem** (Vulnerable Library)

Vulnerability Details

The xz_head function in xzlib.c in libxml2 before 2.9.6 allows remote attackers to cause a denial of service (memory consumption) via a crafted LZMA file, because the decoder functionality does not restrict memory usage to what is required for a legitimate file.

Publish Date: 2018-04-08

URL: CVE-2017-18258

CVSS 3 Score Details (6.5)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://nvd.nist.gov/vuln/detail/CVE-2017-18258

Release Date: 2018-04-08

Fix Resolution: 2.9.6


Step up your Open Source Security Game with WhiteSource here