You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
A command injection vulnerability in Nokogiri v1.10.3 and earlier allows commands to be executed in a subprocess via Ruby's Kernel.open method. Processes are vulnerable only if the undocumented method Nokogiri::CSS::Tokenizer#load_file is being called with unsafe user input as the filename. This vulnerability appears in code generated by the Rexical gem versions v1.0.6 and earlier. Rexical is used by Nokogiri to generate lexical scanner code for parsing CSS queries. The underlying vulnerability was addressed in Rexical v1.0.7 and Nokogiri upgraded to this version of Rexical in Nokogiri v1.10.4.
mend-bolt-for-githubbot
changed the title
CVE-2019-5477 (Critical) detected in nokogiri-1.5.11.gem
CVE-2019-5477 (Critical) detected in nokogiri-1.5.11.gem - autoclosed
Mar 6, 2025
✔️ This issue was automatically closed by Mend because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the Mend inventory.
CVE-2019-5477 - Critical Severity Vulnerability
Nokogiri (�) is an HTML, XML, SAX, and Reader parser. Among Nokogiri's many features is the ability to search documents via XPath or CSS3 selectors.
XML is like violence - if it doesn�t solve your problems, you are not using
enough of it.
Library home page: https://rubygems.org/gems/nokogiri-1.5.11.gem
Path to dependency file: /vagrant/chef/cookbooks/apt/Gemfile.lock
Path to vulnerable library: /tmp/containerbase/cache/.ruby/cache/nokogiri-1.5.11.gem,/tmp/containerbase/cache/.ruby/cache/nokogiri-1.5.11.gem
Dependency Hierarchy:
Found in HEAD commit: b59f2d05a7d0fd10c7b03bb6f0ebf97757172a71
Found in base branch: master
A command injection vulnerability in Nokogiri v1.10.3 and earlier allows commands to be executed in a subprocess via Ruby's
Kernel.open
method. Processes are vulnerable only if the undocumented methodNokogiri::CSS::Tokenizer#load_file
is being called with unsafe user input as the filename. This vulnerability appears in code generated by the Rexical gem versions v1.0.6 and earlier. Rexical is used by Nokogiri to generate lexical scanner code for parsing CSS queries. The underlying vulnerability was addressed in Rexical v1.0.7 and Nokogiri upgraded to this version of Rexical in Nokogiri v1.10.4.Publish Date: 2019-08-16
URL: CVE-2019-5477
Base Score Metrics:
Type: Upgrade version
Release Date: 2019-08-16
Fix Resolution: nokogiri-v1.10.4, rexical-v1.0.7
Step up your Open Source Security Game with Mend here
The text was updated successfully, but these errors were encountered: