A command injection vulnerability in Nokogiri v1.10.3 and earlier allows commands to be executed in a subprocess via Ruby's `Kernel.open` method. Processes are vulnerable only if the undocumented method `Nokogiri::CSS::Tokenizer#load_file` is being called with unsafe user input as the filename. This vulnerability appears in code generated by the Rexical gem versions v1.0.6 and earlier. Rexical is used by Nokogiri to generate lexical scanner code for parsing CSS queries. The underlying vulnerability was addressed in Rexical v1.0.7 and Nokogiri upgraded to this version of Rexical in Nokogiri v1.10.4.
CVE-2019-5477 - High Severity Vulnerability
Vulnerable Library - nokogiri-1.8.1.gem
Nokogiri (鋸) is an HTML, XML, SAX, and Reader parser. Among Nokogiri's many features is the ability to search documents via XPath or CSS3 selectors.
Library home page: https://rubygems.org/gems/nokogiri-1.8.1.gem
Path to dependency file: /chaltron/Gemfile.lock
Path to vulnerable library: /var/lib/gems/2.3.0/cache/nokogiri-1.8.1.gem
Dependency Hierarchy: - factory_bot_rails-4.8.2.gem (Root Library) - railties-5.1.4.gem - actionpack-5.1.4.gem - rails-dom-testing-2.0.3.gem - :x: **nokogiri-1.8.1.gem** (Vulnerable Library)
Found in HEAD commit: 1a064cdc3927fccfa0d178d4932613686897f05c
Vulnerability Details
A command injection vulnerability in Nokogiri v1.10.3 and earlier allows commands to be executed in a subprocess via Ruby's `Kernel.open` method. Processes are vulnerable only if the undocumented method `Nokogiri::CSS::Tokenizer#load_file` is being called with unsafe user input as the filename. This vulnerability appears in code generated by the Rexical gem versions v1.0.6 and earlier. Rexical is used by Nokogiri to generate lexical scanner code for parsing CSS queries. The underlying vulnerability was addressed in Rexical v1.0.7 and Nokogiri upgraded to this version of Rexical in Nokogiri v1.10.4.
Publish Date: 2019-08-16
URL: CVE-2019-5477
CVSS 3 Score Details (9.8)
Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High
For more information on CVSS3 Scores, click here.Suggested Fix
Type: Upgrade version
Origin: https://github.com/rubysec/ruby-advisory-db/commit/ddeb4ee1d9dce4feaaa1924bc150dc8062426758
Release Date: 2019-01-04
Fix Resolution: nokogiri-v1.10.4, rexical-v1.0.7
Step up your Open Source Security Game with WhiteSource here