Bug 1191029 (CVE-2021-41098)

Summary: VUL-1: CVE-2021-41098: Improper Restriction of XML External Entity Reference (XXE) in Nokogiri on JRuby
Product: [Novell Products] SUSE Security Incidents Reporter: Gabriele Sonnu <gabriele.sonnu>
Component: IncidentsAssignee: Marcus Rückert <mrueckert>
Status: RESOLVED INVALID QA Contact: Security Team bot <security-team>
Severity: Minor    
Priority: P5 - None CC: smash_bz
Version: unspecified   
Target Milestone: ---   
Hardware: Other   
OS: Other   
URL: https://smash.suse.de/issue/311112/
Whiteboard:
Found By: Security Response Team Services Priority:
Business Priority: Blocker: ---
Marketing QA Status: --- IT Deployment: ---

Description Gabriele Sonnu 2021-09-28 11:42:49 UTC
Nokogiri is a Rubygem providing HTML, XML, SAX, and Reader parsers with XPath
and CSS selector support. In Nokogiri v1.12.4 and earlier, on JRuby only, the
SAX parser resolves external entities by default. Users of Nokogiri on JRuby who
parse untrusted documents using any of these classes are affected:
Nokogiri::XML::SAX::Parse, Nokogiri::HTML4::SAX::Parser or its alias
Nokogiri::HTML::SAX::Parser, Nokogiri::XML::SAX::PushParser, and
Nokogiri::HTML4::SAX::PushParser or its alias Nokogiri::HTML::SAX::PushParser.
JRuby users should upgrade to Nokogiri v1.12.5 or later to receive a patch for
this issue. There are no workarounds available for v1.12.4 or earlier. CRuby
users are not affected.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-41098
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41098
https://github.com/sparklemotion/nokogiri/commit/5bf729ff3cc84709ee3c3248c981584088bf9f6d
https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-2rr5-8q37-2w7h
Comment 1 Gabriele Sonnu 2021-09-28 11:46:35 UTC
We don't ship the JRuby part of Nokogiri. Closing bug.