Skip to content

Denial of Service (DoS) in Nokogiri on JRuby

High severity GitHub Reviewed Published Apr 11, 2022 in sparklemotion/nokogiri • Updated Jan 11, 2023

Package

bundler nokogiri (RubyGems)

Affected versions

< 1.13.4

Patched versions

1.13.4

Description

Summary

Nokogiri v1.13.4 updates the vendored org.cyberneko.html library to 1.9.22.noko2 which addresses CVE-2022-24839. That CVE is rated 7.5 (High Severity).

See GHSA-9849-p7jc-9rmv for more information.

Please note that this advisory only applies to the JRuby implementation of Nokogiri < 1.13.4.

Mitigation

Upgrade to Nokogiri >= 1.13.4.

Impact

CVE-2022-24839 in nekohtml

  • Severity: High 7.5
  • Type: CWE-400 Uncontrolled Resource Consumption
  • Description: The fork of org.cyberneko.html used by Nokogiri (Rubygem) raises a java.lang.OutOfMemoryError exception when parsing ill-formed HTML markup.
  • See also: GHSA-9849-p7jc-9rmv

References

@flavorjones flavorjones published to sparklemotion/nokogiri Apr 11, 2022
Published to the GitHub Advisory Database Apr 11, 2022
Reviewed Apr 11, 2022
Last updated Jan 11, 2023

Severity

High
7.5
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
Low
Privileges required
None
User interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Weaknesses

CVE ID

No known CVE

GHSA ID

GHSA-gx8x-g87m-h5q6
Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.