Miggo Logo

CVE-2015-1819: Nokogiri vulnerable to libxml XML Entity Expansion

5

CVSS Score

Basic Information

EPSS Score
0.84568%
Published
8/8/2018
Updated
8/25/2023
KEV Status
No
Technology
TechnologyRuby

Technical Details

CVSS Vector
AV:N/AC:L/Au:N/C:N/I:N/A:P
Package NameEcosystemVulnerable VersionsFirst Patched Version
nokogirirubygems>= 1.6.6.0, <= 1.6.6.31.6.6.4

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The CVE-2015-1819 patch modifies xmlTextReaderRead in libxml2's xmlreader.c to enforce memory constraints via XML_PARSE_HUGE. This function is the primary XML reader interface that processes document content incrementally. The vulnerability manifests when parsing malicious XML with recursive entity expansions without proper memory restrictions. The added flag enforcement in this function directly addresses the memory consumption issue, confirming it as the vulnerable entry point.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

T** xmlr****r in li*xml *llows r*mot* *tt**k*rs to **us* * **ni*l o* s*rvi** (m*mory *onsumption) vi* *r**t** XML **t*, r*l*t** to *n XML *ntity *xp*nsion (X**) *tt**k.

Reasoning

T** *V*-****-**** p*t** mo*i*i*s xmlT*xtR****rR*** in li*xml*'s xmlr****r.* to *n*or** m*mory *onstr*ints vi* XML_P*RS*_*U**. T*is *un*tion is t** prim*ry XML r****r int*r**** t**t pro**ss*s *o*um*nt *ont*nt in*r*m*nt*lly. T** vuln*r**ility m*ni**sts