CVE-2022-29181
Improper Handling of Unexpected Data Type in Nokogiri
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
Nokogiri is an open source XML and HTML library for Ruby. Nokogiri prior to version 1.13.6 does not type-check all inputs into the XML and HTML4 SAX parsers, allowing specially crafted untrusted inputs to cause illegal memory access errors (segfault) or reads from unrelated memory. Version 1.13.6 contains a patch for this issue. As a workaround, ensure the untrusted input is a `String` by calling `#to_s` or equivalent.
Nokogiri es una biblioteca XML y HTML de código abierto para Ruby. En versiones anteriores a 1.13.6, Nokogiri no comprobaba todas las entradas en los analizadores SAX de XML y HTML4, lo que permitía que entradas no confiables especialmente diseñadas causaran errores de acceso a memoria ilegales (segfault) o lecturas de memoria no relacionadas. La versión 1.13.6 contiene un parche para este problema. Como mitigación, asegúrese de que la entrada no confiable es una "String" llamando a "#to_s" o su equivalente
A flaw was found in the rubygem-nokogiri package. This flaw allows malicious users to change partial contents or configurations on the system. Additionally, this vulnerability can also cause a limited denial of service in the form of interruptions in resource availability.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2022-04-13 CVE Reserved
- 2022-05-20 CVE Published
- 2024-08-03 CVE Updated
- 2024-08-03 First Exploit
- 2024-08-11 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-241: Improper Handling of Unexpected Data Type
- CWE-843: Access of Resource Using Incompatible Type ('Type Confusion')
CAPEC
References (9)
URL | Tag | Source |
---|---|---|
http://seclists.org/fulldisclosure/2022/Dec/23 | Mailing List | |
https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.6 | Release Notes | |
https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-xh29-r2w5-wx8m | Issue Tracking | |
https://support.apple.com/kb/HT213532 | Third Party Advisory |
URL | Date | SRC |
---|---|---|
https://securitylab.github.com/advisories/GHSL-2022-031_GHSL-2022-032_Nokogiri | 2024-08-03 |
URL | Date | SRC |
---|---|---|
https://github.com/sparklemotion/nokogiri/commit/db05ba9a1bd4b90aa6c76742cf6102a7c7297267 | 2023-02-16 |
URL | Date | SRC |
---|---|---|
https://security.gentoo.org/glsa/202208-29 | 2023-02-16 | |
https://access.redhat.com/security/cve/CVE-2022-29181 | 2022-11-16 | |
https://bugzilla.redhat.com/show_bug.cgi?id=2088684 | 2022-11-16 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Nokogiri Search vendor "Nokogiri" | Nokogiri Search vendor "Nokogiri" for product "Nokogiri" | < 1.13.6 Search vendor "Nokogiri" for product "Nokogiri" and version " < 1.13.6" | ruby |
Affected
| ||||||
Apple Search vendor "Apple" | Macos Search vendor "Apple" for product "Macos" | >= 13.0 < 13.1 Search vendor "Apple" for product "Macos" and version " >= 13.0 < 13.1" | - |
Affected
|