HomeNokogiriCVE-2020-26247

CVE-2020-26247

LOW
2.6CVSS
Published: 2020-12-30
Updated: 2024-11-21
AI Analysis

Description

Nokogiri is a Rubygem providing HTML, XML, SAX, and Reader parsers with XPath and CSS selector support. In Nokogiri before version 1.11.0.rc4 there is an XXE vulnerability. XML Schemas parsed by Nokogiri::XML::Schema are trusted by default, allowing external resources to be accessed over the network, potentially enabling XXE or SSRF attacks. This behavior is counter to the security policy followed by Nokogiri maintainers, which is to treat all input as untrusted by default whenever possible. This is fixed in Nokogiri version 1.11.0.rc4.

CVSS Metrics

Vector
CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N
Attack Vector
network
Complexity
high
Privileges
low
User Action
required
Scope
unchanged
Confidentiality
low
Integrity
none
Availability
none
Weaknesses
CWE-611CWE-611

Metadata

Primary Vendor
NOKOGIRI
Published
12/30/2020
Last Modified
11/21/2024
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

nokogiri : nokogirinokogiri : nokogirinokogiri : nokogirinokogiri : nokogiridebian : debian_linuxdebian : debian_linux

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief

CVE-CVE-2020-26247 | LOW Severity | CVEDatabase.com | CVEDatabase.com