Improper Restriction of XML External Entity Reference (XXE) in Nokogiri on JRuby
High severity
GitHub Reviewed
Published
Sep 27, 2021
in
sparklemotion/nokogiri
•
Updated May 4, 2023
Description
Reviewed
Sep 27, 2021
Published to the GitHub Advisory Database
Sep 27, 2021
Published by the National Vulnerability Database
Sep 27, 2021
Last updated
May 4, 2023
Severity
The Nokogiri maintainers have evaluated this as High Severity 7.5 (CVSS3.0) for JRuby users. (This security advisory does not apply to CRuby users.)
Impact
In Nokogiri v1.12.4 and earlier, on JRuby only, the SAX parser resolves external entities by default.
Users of Nokogiri on JRuby who parse untrusted documents using any of these classes are affected:
Mitigation
JRuby users should upgrade to Nokogiri v1.12.5 or later. There are no workarounds available for v1.12.4 or earlier.
CRuby users are not affected.
References