First published: Mon Jan 05 2015(Updated: )
An XML eXternal Entity (XXE) flaw was found in Nokogiri, a Ruby gem for parsing HTML, XML, and SAX. Using external XML entities, a remote attacker could specify a URL in a specially crafted XML that, when parsed, would cause a connection to that URL to be opened. A patch shipped with the 1.5.4 release of Nokogiri provided a "nonet" option to disable external connections. However, local file URLs could still be used to exploit this flaw. The 1.6.4 release of Nokogiri fixed this issue by using libxml2 2.9.0. Additional information is detailed at: <a href="https://github.com/sparklemotion/nokogiri/issues/693#issuecomment-68334768">https://github.com/sparklemotion/nokogiri/issues/693#issuecomment-68334768</a> CVE request and assignment: <a href="http://seclists.org/oss-sec/2015/q1/57">http://seclists.org/oss-sec/2015/q1/57</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/nokogiri | <1.6.4 | 1.6.4 |
Nokogiri Nokogiri | <1.5.4 | |
Redhat Cloudforms Management Engine | =5.0 | |
Redhat Openshift | =2.0 | |
Redhat Openstack | =4.0 | |
Redhat Openstack | =6.0 | |
Redhat Openstack Foreman | ||
Redhat Satellite | =6.0 | |
Redhat Subscription Asset Manager | ||
Redhat Enterprise Mrg | =2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.