CVE-2022-29181
Improper Handling of Unexpected Data Type in Nokogiri
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
Nokogiri is an open source XML and HTML library for Ruby. Nokogiri prior to version 1.13.6 does not type-check all inputs into the XML and HTML4 SAX parsers, allowing specially crafted untrusted inputs to cause illegal memory access errors (segfault) or reads from unrelated memory. Version 1.13.6 contains a patch for this issue. As a workaround, ensure the untrusted input is a `String` by calling `#to_s` or equivalent.
Nokogiri es una biblioteca XML y HTML de código abierto para Ruby. En versiones anteriores a 1.13.6, Nokogiri no comprobaba todas las entradas en los analizadores SAX de XML y HTML4, lo que permitía que entradas no confiables especialmente diseñadas causaran errores de acceso a memoria ilegales (segfault) o lecturas de memoria no relacionadas. La versión 1.13.6 contiene un parche para este problema. Como mitigación, asegúrese de que la entrada no confiable es una "String" llamando a "#to_s" o su equivalente
A flaw was found in the rubygem-nokogiri package. This flaw allows malicious users to change partial contents or configurations on the system. Additionally, this vulnerability can also cause a limited denial of service in the form of interruptions in resource availability.
Multiple vulnerabilities have been discovered in Nokogiri, the worst of which could result in denial of service. Versions less than 1.13.6 are affected.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2022-04-13 CVE Reserved
- 2022-05-20 CVE Published
- 2024-08-03 CVE Updated
- 2024-08-03 First Exploit
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-241: Improper Handling of Unexpected Data Type
- CWE-843: Access of Resource Using Incompatible Type ('Type Confusion')
CAPEC
References (9)
URL | Tag | Source |
---|---|---|
http://seclists.org/fulldisclosure/2022/Dec/23 | Mailing List |
|
https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.6 | Release Notes | |
https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-xh29-r2w5-wx8m | Issue Tracking | |
https://support.apple.com/kb/HT213532 | Third Party Advisory |
|
URL | Date | SRC |
---|---|---|
https://securitylab.github.com/advisories/GHSL-2022-031_GHSL-2022-032_Nokogiri | 2024-08-03 |
URL | Date | SRC |
---|---|---|
https://github.com/sparklemotion/nokogiri/commit/db05ba9a1bd4b90aa6c76742cf6102a7c7297267 | 2023-02-16 |
URL | Date | SRC |
---|---|---|
https://security.gentoo.org/glsa/202208-29 | 2023-02-16 | |
https://access.redhat.com/security/cve/CVE-2022-29181 | 2022-11-16 | |
https://bugzilla.redhat.com/show_bug.cgi?id=2088684 | 2022-11-16 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Nokogiri Search vendor "Nokogiri" | Nokogiri Search vendor "Nokogiri" for product "Nokogiri" | < 1.13.6 Search vendor "Nokogiri" for product "Nokogiri" and version " < 1.13.6" | ruby |
Affected
| ||||||
Apple Search vendor "Apple" | Macos Search vendor "Apple" for product "Macos" | >= 13.0 < 13.1 Search vendor "Apple" for product "Macos" and version " >= 13.0 < 13.1" | - |
Affected
|