logo

CVE-2022-29181 nokogiri

Package

Manager: gem
Name: nokogiri
Vulnerable Version: >=0 <1.13.6

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N

EPSS: 0.06706 pctl0.90887

Details

Nokogiri Improperly Handles Unexpected Data Type ### Summary Nokogiri `< v1.13.6` does not type-check all inputs into the XML and HTML4 SAX parsers. For CRuby users, this may allow specially crafted untrusted inputs to cause illegal memory access errors (segfault) or reads from unrelated memory. ### Severity The Nokogiri maintainers have evaluated this as **High 8.2** (CVSS3.1). ### Mitigation CRuby users should upgrade to Nokogiri `>= 1.13.6`. JRuby users are not affected. ### Workarounds To avoid this vulnerability in affected applications, ensure the untrusted input is a `String` by calling `#to_s` or equivalent. ### Credit This vulnerability was responsibly reported by @agustingianni and the Github Security Lab.

Metadata

Created: 2022-05-23T23:15:15Z
Modified: 2025-05-27T14:51:05Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-xh29-r2w5-wx8m/GHSA-xh29-r2w5-wx8m.json
CWE IDs: ["CWE-241", "CWE-843"]
Alternative ID: GHSA-xh29-r2w5-wx8m
Finding: F113
Auto approve: 1