A command injection vulnerability in Nokogiri v1.10.3 and earlier allows
commands to be executed in a subprocess via Ruby's `` method.
Processes are vulnerable only if the undocumented method
`Nokogiri::CSS::Tokenizer#load_file` is being called with unsafe user input
as the filename. This vulnerability appears in code generated by the
Rexical gem versions v1.0.6 and earlier. Rexical is used by Nokogiri to
generate lexical scanner code for parsing CSS queries. The underlying
vulnerability was addressed in Rexical v1.0.7 and Nokogiri upgraded to this
version of Rexical in Nokogiri v1.10.4.
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 ESM (Trusty Tahr):needed
Ubuntu 16.04 LTS (Xenial Xerus):released (
Ubuntu 18.04 LTS (Bionic Beaver):released (1.8.2-1ubuntu0.1)
Ubuntu 19.10 (Eoan Ermine):released (1.10.3+dfsg1-2ubuntu0.1)
Ubuntu 20.04 (Focal Fossa):not-affected (1.10.4+dfsg1-1)
More Information

Updated: 2020-04-24 03:57:12 UTC (commit d3f8a6ed481830fb100109a132bef581fc4176fe)