GMS-2022-788: XML Injection in Xerces Java affects Nokogiri
Summary
Nokogiri v1.13.4 updates the vendored xerces:xercesImpl
from 2.12.0 to 2.12.2, which addresses CVE-2022-23437. That CVE is scored as CVSS 6.5 “Medium” on the NVD record.
Please note that this advisory only applies to the JRuby implementation of Nokogiri < 1.13.4
.
Mitigation
Upgrade to Nokogiri >= v1.13.4
.
Impact
<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23437" target="_blank" rel="nofollow">CVE-2022-23437</a> in xerces-J
- Severity: Medium
- Type: CWE-91 XML Injection (aka Blind XPath Injection)
- Description: There’s a vulnerability within the Apache Xerces Java (XercesJ) XML parser when handling specially crafted XML document payloads. This causes, the XercesJ XML parser to wait in an infinite loop, which may sometimes consume system resources for prolonged duration. This vulnerability is present within XercesJ version 2.12.1 and the previous versions.
- See also: https://github.com/advisories/GHSA-h65f-jvqw-m9fj
References
- github.com/advisories/GHSA-h65f-jvqw-m9fj
- github.com/advisories/GHSA-xxx9-3xcr-gjj3
- github.com/sparklemotion/nokogiri/releases/tag/v1.13.4
- github.com/sparklemotion/nokogiri/security/advisories/GHSA-xxx9-3xcr-gjj3
- groups.google.com/g/ruby-security-ann/c/vX7qSjsvWis/m/TJWN4oOKBwAJ?utm_medium=email&utm_source=footer
- nvd.nist.gov/vuln/detail/CVE-2022-23437
Detect and mitigate GMS-2022-788 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →