In Nokogiri before version 1.11.0.rc4 there is an XXE vulnerability. XML Schemas parsed by Nokogiri::XML::Schema are trusted by default, allowing external resources to be accessed over the network, potentially enabling XXE or SSRF attacks. References: https://github.com/sparklemotion/nokogiri/commit/9c87439d9afa14a365ff13e73adc809cb2c3d97b https://github.com/sparklemotion/nokogiri/releases/tag/v1.11.0.rc4 https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-vr8q-g5c7-m54m https://hackerone.com/reports/747489 https://rubygems.org/gems/nokogiri
Created rubygem-nokogiri tracking bugs for this issue: Affects: epel-7 [bug 1912490] Affects: fedora-all [bug 1912488]
External References: https://github.com/advisories/GHSA-vr8q-g5c7-m54m
Mitigation: There are no known workarounds for affected versions. Please refer to the upstream advisory page for additional information.
This issue has been addressed in the following products: Red Hat Satellite 6.10 for RHEL 7 Via RHSA-2021:4702 https://access.redhat.com/errata/RHSA-2021:4702
This issue has been addressed in the following products: 3scale API Management Via RHSA-2021:5191 https://access.redhat.com/errata/RHSA-2021:5191