
Cloud Vulnerability DB
A community-led vulnerabilities database
Nokogiri before version 1.5.4 was found to contain an XML eXternal Entity (XXE) vulnerability. The issue was discovered and reported by Felix Groebert of Google, and was assigned CVE-2012-6685. The vulnerability affected the XML parsing functionality in Nokogiri, a popular Ruby gem for parsing HTML, XML, and SAX documents (Debian Tracker, NVD).
The vulnerability allowed external XML entities to be specified in specially crafted XML documents. When such documents were parsed, they could trigger connections to specified URLs, potentially leading to unauthorized access of resources. The issue was particularly concerning because it could be exploited through both network-based and local file URLs (GitHub Issue).
The vulnerability could allow attackers to trigger connections to internal network resources or access local files through specially crafted XML documents. This could potentially lead to information disclosure or unauthorized access to resources on systems processing XML content with affected Nokogiri versions (Red Hat Bugzilla).
The vulnerability was addressed in Nokogiri version 1.5.4 through the introduction of a 'nonet' option to disable external connections. However, it was noted that local file URLs could still be used to exploit the vulnerability. A complete fix was later implemented in version 1.6.4 by updating to libxml2 2.9.0 (Nokogiri Changelog).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."