{
  "threat_severity" : "Moderate",
  "public_date" : "2020-12-30T00:00:00Z",
  "bugzilla" : {
    "description" : "rubygem-nokogiri: XML external entity injection via Nokogiri::XML::Schema",
    "id" : "1912487",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1912487"
  },
  "cvss3" : {
    "cvss3_base_score" : "4.3",
    "cvss3_scoring_vector" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
    "status" : "verified"
  },
  "cwe" : "CWE-611",
  "details" : [ "Nokogiri is a Rubygem providing HTML, XML, SAX, and Reader parsers with XPath and CSS selector support. In Nokogiri before version 1.11.0.rc4 there is an XXE vulnerability. XML Schemas parsed by Nokogiri::XML::Schema are trusted by default, allowing external resources to be accessed over the network, potentially enabling XXE or SSRF attacks. This behavior is counter to the security policy followed by Nokogiri maintainers, which is to treat all input as untrusted by default whenever possible. This is fixed in Nokogiri version 1.11.0.rc4.", "A flaw was found in Nokogiri. XML Schemas parsed by Nokogiri::XML::Schema are trusted by default, allowing external resources to be accessed over the network, potentially enabling XML External Entity (XXE) or Server-side request forgery (SSRF) attacks. The highest threat from this vulnerability is to data confidentiality." ],
  "affected_release" : [ {
    "product_name" : "3scale API Management 2.11 on RHEL 7",
    "release_date" : "2021-12-16T00:00:00Z",
    "advisory" : "RHSA-2021:5191",
    "cpe" : "cpe:/a:redhat:3scale_amp:2.11::el7",
    "package" : "3scale-amp2/3scale-rhel7-operator:1.14.1-10"
  }, {
    "product_name" : "3scale API Management 2.11 on RHEL 7",
    "release_date" : "2021-12-16T00:00:00Z",
    "advisory" : "RHSA-2021:5191",
    "cpe" : "cpe:/a:redhat:3scale_amp:2.11::el7",
    "package" : "3scale-amp2/3scale-rhel7-operator-metadata:2.11.1-33"
  }, {
    "product_name" : "3scale API Management 2.11 on RHEL 7",
    "release_date" : "2021-12-16T00:00:00Z",
    "advisory" : "RHSA-2021:5191",
    "cpe" : "cpe:/a:redhat:3scale_amp:2.11::el7",
    "package" : "3scale-amp2/apicast-rhel7-operator:1.14.1-6"
  }, {
    "product_name" : "3scale API Management 2.11 on RHEL 7",
    "release_date" : "2021-12-16T00:00:00Z",
    "advisory" : "RHSA-2021:5191",
    "cpe" : "cpe:/a:redhat:3scale_amp:2.11::el7",
    "package" : "3scale-amp2/apicast-rhel7-operator-metadata:2.11.1-10"
  }, {
    "product_name" : "3scale API Management 2.11 on RHEL 7",
    "release_date" : "2021-12-16T00:00:00Z",
    "advisory" : "RHSA-2021:5191",
    "cpe" : "cpe:/a:redhat:3scale_amp:2.11::el7",
    "package" : "3scale-amp2/memcached-rhel7:1.4.16-42"
  }, {
    "product_name" : "3scale API Management 2.11 on RHEL 7",
    "release_date" : "2021-12-16T00:00:00Z",
    "advisory" : "RHSA-2021:5191",
    "cpe" : "cpe:/a:redhat:3scale_amp:2.11::el7",
    "package" : "3scale-amp2/system-rhel7:1.15.1-13"
  }, {
    "product_name" : "3scale API Management 2.11 on RHEL 8",
    "release_date" : "2021-12-16T00:00:00Z",
    "advisory" : "RHSA-2021:5191",
    "cpe" : "cpe:/a:redhat:3scale_amp:2.11::el8",
    "package" : "3scale-amp2/apicast-gateway-rhel8:1.20.1-4"
  }, {
    "product_name" : "3scale API Management 2.11 on RHEL 8",
    "release_date" : "2021-12-16T00:00:00Z",
    "advisory" : "RHSA-2021:5191",
    "cpe" : "cpe:/a:redhat:3scale_amp:2.11::el8",
    "package" : "3scale-amp2/backend-rhel8:1.14.1-3"
  }, {
    "product_name" : "3scale API Management 2.11 on RHEL 8",
    "release_date" : "2021-12-16T00:00:00Z",
    "advisory" : "RHSA-2021:5191",
    "cpe" : "cpe:/a:redhat:3scale_amp:2.11::el8",
    "package" : "3scale-amp2/toolbox-rhel8:1.7.1-5"
  }, {
    "product_name" : "3scale API Management 2.11 on RHEL 8",
    "release_date" : "2021-12-16T00:00:00Z",
    "advisory" : "RHSA-2021:5191",
    "cpe" : "cpe:/a:redhat:3scale_amp:2.11::el8",
    "package" : "3scale-amp2/zync-rhel8:1.14.1-3"
  }, {
    "product_name" : "Red Hat Satellite 6.10 for RHEL 7",
    "release_date" : "2021-11-16T00:00:00Z",
    "advisory" : "RHSA-2021:4702",
    "cpe" : "cpe:/a:redhat:satellite:6.10::el7",
    "package" : "tfm-rubygem-nokogiri-0:1.11.3-2.el7sat"
  }, {
    "product_name" : "Red Hat Satellite 6.10 for RHEL 7",
    "release_date" : "2021-11-16T00:00:00Z",
    "advisory" : "RHSA-2021:4702",
    "cpe" : "cpe:/a:redhat:satellite_capsule:6.10::el7",
    "package" : "tfm-rubygem-nokogiri-0:1.11.3-2.el7sat"
  } ],
  "package_state" : [ {
    "product_name" : "CloudForms Management Engine 5",
    "fix_state" : "Will not fix",
    "package_name" : "rubygem-nokogiri",
    "cpe" : "cpe:/a:redhat:cloudforms_managementengine:5"
  }, {
    "product_name" : "Red Hat Satellite 6",
    "fix_state" : "Will not fix",
    "package_name" : "tfm-ror52-rubygem-nokogiri",
    "cpe" : "cpe:/a:redhat:satellite:6"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2020-26247\nhttps://nvd.nist.gov/vuln/detail/CVE-2020-26247\nhttps://github.com/advisories/GHSA-vr8q-g5c7-m54m" ],
  "name" : "CVE-2020-26247",
  "mitigation" : {
    "value" : "There are no known workarounds for affected versions. Please refer to the upstream advisory page for additional information.",
    "lang" : "en:us"
  },
  "csaw" : false
}