Skip to content

Nokogiri contains libxml Out-of-bounds Write vulnerability

High severity GitHub Reviewed Published May 24, 2022 to the GitHub Advisory Database • Updated Aug 28, 2023

Package

bundler nokogiri (RubyGems)

Affected versions

< 1.11.4

Patched versions

1.11.4

Description

There is a flaw in the xml entity encoding functionality of libxml2 in versions before 2.9.11. An attacker who is able to supply a crafted file to be processed by an application linked with the affected functionality of libxml2 could trigger an out-of-bounds read. The most likely impact of this flaw is to application availability, with some potential impact to confidentiality and integrity if an attacker is able to use memory information to further exploit the application.

Nokogiri prior to version 1.11.4 used a vulnerable version of libxml2. Nokogiri 1.11.4 updated libxml2 to version 2.9.11 to address this and other vulnerabilities in libxml2.

References

Published by the National Vulnerability Database May 19, 2021
Published to the GitHub Advisory Database May 24, 2022
Reviewed Mar 8, 2023
Last updated Aug 28, 2023

Severity

High
8.6
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
Low
Privileges required
None
User interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
High
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H

Weaknesses

CVE ID

CVE-2021-3517

GHSA ID

GHSA-jw9f-hh49-cvp9
Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.