Command Injection in ruby-nokogiri (Alpine package)



Published: 2019-08-12 | Updated: 2022-06-12
Risk High
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2019-5477
CWE-ID CWE-77
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
ruby-nokogiri (Alpine package)
Operating systems & Components / Operating system package or component

Vendor Alpine Linux Development Team

Security Bulletin

This security bulletin contains one high risk vulnerability.

1) Command Injection

EUVDB-ID: #VU32012

Risk: High

CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2019-5477

CWE-ID: CWE-77 - Command injection

Exploit availability: No

Description

The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.

A command injection vulnerability in Nokogiri v1.10.3 and earlier allows commands to be executed in a subprocess via Ruby's `Kernel.open` method. Processes are vulnerable only if the undocumented method `Nokogiri::CSS::Tokenizer#load_file` is being called with unsafe user input as the filename. This vulnerability appears in code generated by the Rexical gem versions v1.0.6 and earlier. Rexical is used by Nokogiri to generate lexical scanner code for parsing CSS queries. The underlying vulnerability was addressed in Rexical v1.0.7 and Nokogiri upgraded to this version of Rexical in Nokogiri v1.10.4.

Mitigation

Install update from vendor's website.

Vulnerable software versions

ruby-nokogiri (Alpine package): 1.10.3-r0

External links

http://git.alpinelinux.org/aports/commit/?id=b127c6f6cf45e6a2a08272a7fe34daadfdb6684a
http://git.alpinelinux.org/aports/commit/?id=53e015e6726f37a7111be656b8fbf4baed50ccf4


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###