{
	"document":{
		"aggregate_severity":{
			"namespace":"https://nvd.nist.gov/vuln-metrics/cvss",
			"text":"Medium"
		},
		"category":"csaf_vex",
		"csaf_version":"2.0",
		"distribution":{
			"tlp":{
				"label":"WHITE",
				"url":"https:/www.first.org/tlp/"
			}
		},
		"lang":"en",
		"notes":[
			{
				"text":"rubygem-nokogiri security update",
				"category":"general",
				"title":"Synopsis"
			},
			{
				"text":"An update for rubygem-nokogiri is now available for openEuler-20.03-LTS-SP1.",
				"category":"general",
				"title":"Summary"
			},
			{
				"text":"Nokogiri parses and searches XML/HTML very quickly, and also has correctly implemented CSS3 selector support as well as XPath support. Nokogiri also features an Hpricot compatibility layer to help ease the change to using correct CSS and XPath.\n\nSecurity Fix(es):\n\nNokogiri is a Rubygem providing HTML, XML, SAX, and Reader parsers with XPath and CSS selector support. In Nokogiri before version 1.11.0.rc4 there is an XXE vulnerability. XML Schemas parsed by Nokogiri::XML::Schema are trusted by default, allowing external resources to be accessed over the network, potentially enabling XXE or SSRF attacks. This behavior is counter to the security policy followed by Nokogiri maintainers, which is to treat all input as untrusted by default whenever possible. This is fixed in Nokogiri version 1.11.0.rc4.(CVE-2020-26247)",
				"category":"general",
				"title":"Description"
			},
			{
				"text":"An update for rubygem-nokogiri is now available for openEuler-20.03-LTS-SP1.\n\nopenEuler Security has rated this update as having a security impact of medium. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.",
				"category":"general",
				"title":"Topic"
			},
			{
				"text":"Medium",
				"category":"general",
				"title":"Severity"
			},
			{
				"text":"rubygem-nokogiri",
				"category":"general",
				"title":"Affected Component"
			}
		],
		"publisher":{
			"issuing_authority":"openEuler security committee",
			"name":"openEuler",
			"namespace":"https://www.openeuler.org",
			"contact_details":"openeuler-security@openeuler.org",
			"category":"vendor"
		},
		"references":[
			{
				"summary":"openEuler-SA-2021-1144",
				"category":"self",
				"url":"https://openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2021-1144"
			},
			{
				"summary":"CVE-2020-26247",
				"category":"self",
				"url":"https://openeuler.org/en/security/cve/detail?cveId=CVE-2020-26247&packageName=rubygem-nokogiri"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-26247"
			},
			{
				"summary":"openEuler-SA-2021-1144 vex file",
				"category":"self",
				"url":"https://repo.openeuler.org/security/data/csaf/advisories/2021/csaf-openeuler-sa-2021-1144.json"
			}
		],
		"title":"An update for rubygem-nokogiri is now available for openEuler-20.03-LTS-SP1",
		"tracking":{
			"initial_release_date":"2021-04-07T09:19:02+08:00",
			"revision_history":[
				{
					"date":"2021-04-07T09:19:02+08:00",
					"summary":"Initial",
					"number":"1.0.0"
				},
				{
					"date":"2024-10-31T09:19:02+08:00",
					"summary":"final",
					"number":"2.0.0"
				}
			],
			"generator":{
				"date":"2024-10-31T09:19:02+08:00",
				"engine":{
					"name":"openEuler CSAF Tool V1.0"
				}
			},
			"current_release_date":"2024-10-31T09:19:02+08:00",
			"id":"openEuler-SA-2021-1144",
			"version":"2.0.0",
			"status":"final"
		}
	},
	"product_tree":{
		"branches":[
			{
				"name":"openEuler",
				"category":"vendor",
				"branches":[
					{
						"name":"openEuler",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:20.03-LTS-SP1"
									},
									"product_id":"openEuler-20.03-LTS-SP1",
									"name":"openEuler-20.03-LTS-SP1"
								},
								"name":"openEuler-20.03-LTS-SP1",
								"category":"product_version"
							}
						],
						"category":"product_name"
					},
					{
						"name":"aarch64",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:20.03-LTS-SP1"
									},
									"product_id":"rubygem-nokogiri-debuginfo-1.10.5-2.oe1.aarch64.rpm(20.03-LTS-SP1)",
									"name":"rubygem-nokogiri-debuginfo-1.10.5-2.oe1.aarch64.rpm"
								},
								"name":"rubygem-nokogiri-debuginfo-1.10.5-2.oe1.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:20.03-LTS-SP1"
									},
									"product_id":"rubygem-nokogiri-1.10.5-2.oe1.aarch64.rpm(20.03-LTS-SP1)",
									"name":"rubygem-nokogiri-1.10.5-2.oe1.aarch64.rpm"
								},
								"name":"rubygem-nokogiri-1.10.5-2.oe1.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:20.03-LTS-SP1"
									},
									"product_id":"rubygem-nokogiri-debugsource-1.10.5-2.oe1.aarch64.rpm(20.03-LTS-SP1)",
									"name":"rubygem-nokogiri-debugsource-1.10.5-2.oe1.aarch64.rpm"
								},
								"name":"rubygem-nokogiri-debugsource-1.10.5-2.oe1.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:20.03-LTS-SP1"
									},
									"product_id":"rubygem-nokogiri-doc-1.10.5-2.oe1.aarch64.rpm(20.03-LTS-SP1)",
									"name":"rubygem-nokogiri-doc-1.10.5-2.oe1.aarch64.rpm"
								},
								"name":"rubygem-nokogiri-doc-1.10.5-2.oe1.aarch64.rpm",
								"category":"product_version"
							}
						],
						"category":"architecture"
					},
					{
						"name":"src",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:20.03-LTS-SP1"
									},
									"product_id":"rubygem-nokogiri-1.10.5-2.oe1.src.rpm(20.03-LTS-SP1)",
									"name":"rubygem-nokogiri-1.10.5-2.oe1.src.rpm"
								},
								"name":"rubygem-nokogiri-1.10.5-2.oe1.src.rpm",
								"category":"product_version"
							}
						],
						"category":"architecture"
					},
					{
						"name":"x86_64",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:20.03-LTS-SP1"
									},
									"product_id":"rubygem-nokogiri-debuginfo-1.10.5-2.oe1.x86_64.rpm(20.03-LTS-SP1)",
									"name":"rubygem-nokogiri-debuginfo-1.10.5-2.oe1.x86_64.rpm"
								},
								"name":"rubygem-nokogiri-debuginfo-1.10.5-2.oe1.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:20.03-LTS-SP1"
									},
									"product_id":"rubygem-nokogiri-doc-1.10.5-2.oe1.x86_64.rpm(20.03-LTS-SP1)",
									"name":"rubygem-nokogiri-doc-1.10.5-2.oe1.x86_64.rpm"
								},
								"name":"rubygem-nokogiri-doc-1.10.5-2.oe1.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:20.03-LTS-SP1"
									},
									"product_id":"rubygem-nokogiri-1.10.5-2.oe1.x86_64.rpm(20.03-LTS-SP1)",
									"name":"rubygem-nokogiri-1.10.5-2.oe1.x86_64.rpm"
								},
								"name":"rubygem-nokogiri-1.10.5-2.oe1.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:20.03-LTS-SP1"
									},
									"product_id":"rubygem-nokogiri-debugsource-1.10.5-2.oe1.x86_64.rpm(20.03-LTS-SP1)",
									"name":"rubygem-nokogiri-debugsource-1.10.5-2.oe1.x86_64.rpm"
								},
								"name":"rubygem-nokogiri-debugsource-1.10.5-2.oe1.x86_64.rpm",
								"category":"product_version"
							}
						],
						"category":"architecture"
					}
				]
			}
		],
		"relationships":[
			{
				"relates_to_product_reference":"openEuler-20.03-LTS-SP1",
				"product_reference":"rubygem-nokogiri-debuginfo-1.10.5-2.oe1.aarch64.rpm(20.03-LTS-SP1)",
				"full_product_name":{
					"product_id":"openEuler-20.03-LTS-SP1:rubygem-nokogiri-debuginfo-1.10.5-2.oe1.aarch64",
					"name":"rubygem-nokogiri-debuginfo-1.10.5-2.oe1.aarch64 as a component of openEuler-20.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-20.03-LTS-SP1",
				"product_reference":"rubygem-nokogiri-1.10.5-2.oe1.aarch64.rpm(20.03-LTS-SP1)",
				"full_product_name":{
					"product_id":"openEuler-20.03-LTS-SP1:rubygem-nokogiri-1.10.5-2.oe1.aarch64",
					"name":"rubygem-nokogiri-1.10.5-2.oe1.aarch64 as a component of openEuler-20.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-20.03-LTS-SP1",
				"product_reference":"rubygem-nokogiri-debugsource-1.10.5-2.oe1.aarch64.rpm(20.03-LTS-SP1)",
				"full_product_name":{
					"product_id":"openEuler-20.03-LTS-SP1:rubygem-nokogiri-debugsource-1.10.5-2.oe1.aarch64",
					"name":"rubygem-nokogiri-debugsource-1.10.5-2.oe1.aarch64 as a component of openEuler-20.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-20.03-LTS-SP1",
				"product_reference":"rubygem-nokogiri-doc-1.10.5-2.oe1.aarch64.rpm(20.03-LTS-SP1)",
				"full_product_name":{
					"product_id":"openEuler-20.03-LTS-SP1:rubygem-nokogiri-doc-1.10.5-2.oe1.aarch64",
					"name":"rubygem-nokogiri-doc-1.10.5-2.oe1.aarch64 as a component of openEuler-20.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-20.03-LTS-SP1",
				"product_reference":"rubygem-nokogiri-1.10.5-2.oe1.src.rpm(20.03-LTS-SP1)",
				"full_product_name":{
					"product_id":"openEuler-20.03-LTS-SP1:rubygem-nokogiri-1.10.5-2.oe1.src",
					"name":"rubygem-nokogiri-1.10.5-2.oe1.src as a component of openEuler-20.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-20.03-LTS-SP1",
				"product_reference":"rubygem-nokogiri-debuginfo-1.10.5-2.oe1.x86_64.rpm(20.03-LTS-SP1)",
				"full_product_name":{
					"product_id":"openEuler-20.03-LTS-SP1:rubygem-nokogiri-debuginfo-1.10.5-2.oe1.x86_64",
					"name":"rubygem-nokogiri-debuginfo-1.10.5-2.oe1.x86_64 as a component of openEuler-20.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-20.03-LTS-SP1",
				"product_reference":"rubygem-nokogiri-doc-1.10.5-2.oe1.x86_64.rpm(20.03-LTS-SP1)",
				"full_product_name":{
					"product_id":"openEuler-20.03-LTS-SP1:rubygem-nokogiri-doc-1.10.5-2.oe1.x86_64",
					"name":"rubygem-nokogiri-doc-1.10.5-2.oe1.x86_64 as a component of openEuler-20.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-20.03-LTS-SP1",
				"product_reference":"rubygem-nokogiri-1.10.5-2.oe1.x86_64.rpm(20.03-LTS-SP1)",
				"full_product_name":{
					"product_id":"openEuler-20.03-LTS-SP1:rubygem-nokogiri-1.10.5-2.oe1.x86_64",
					"name":"rubygem-nokogiri-1.10.5-2.oe1.x86_64 as a component of openEuler-20.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-20.03-LTS-SP1",
				"product_reference":"rubygem-nokogiri-debugsource-1.10.5-2.oe1.x86_64.rpm(20.03-LTS-SP1)",
				"full_product_name":{
					"product_id":"openEuler-20.03-LTS-SP1:rubygem-nokogiri-debugsource-1.10.5-2.oe1.x86_64",
					"name":"rubygem-nokogiri-debugsource-1.10.5-2.oe1.x86_64 as a component of openEuler-20.03-LTS-SP1"
				},
				"category":"default_component_of"
			}
		]
	},
	"vulnerabilities":[
		{
			"cve":"CVE-2020-26247",
			"notes":[
				{
					"text":"Nokogiri is a Rubygem providing HTML, XML, SAX, and Reader parsers with XPath and CSS selector support. In Nokogiri before version 1.11.0.rc4 there is an XXE vulnerability. XML Schemas parsed by Nokogiri::XML::Schema are trusted by default, allowing external resources to be accessed over the network, potentially enabling XXE or SSRF attacks. This behavior is counter to the security policy followed by Nokogiri maintainers, which is to treat all input as untrusted by default whenever possible. This is fixed in Nokogiri version 1.11.0.rc4.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-20.03-LTS-SP1:rubygem-nokogiri-debuginfo-1.10.5-2.oe1.aarch64",
					"openEuler-20.03-LTS-SP1:rubygem-nokogiri-1.10.5-2.oe1.aarch64",
					"openEuler-20.03-LTS-SP1:rubygem-nokogiri-debugsource-1.10.5-2.oe1.aarch64",
					"openEuler-20.03-LTS-SP1:rubygem-nokogiri-doc-1.10.5-2.oe1.aarch64",
					"openEuler-20.03-LTS-SP1:rubygem-nokogiri-1.10.5-2.oe1.src",
					"openEuler-20.03-LTS-SP1:rubygem-nokogiri-debuginfo-1.10.5-2.oe1.x86_64",
					"openEuler-20.03-LTS-SP1:rubygem-nokogiri-doc-1.10.5-2.oe1.x86_64",
					"openEuler-20.03-LTS-SP1:rubygem-nokogiri-1.10.5-2.oe1.x86_64",
					"openEuler-20.03-LTS-SP1:rubygem-nokogiri-debugsource-1.10.5-2.oe1.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-20.03-LTS-SP1:rubygem-nokogiri-debuginfo-1.10.5-2.oe1.aarch64",
						"openEuler-20.03-LTS-SP1:rubygem-nokogiri-1.10.5-2.oe1.aarch64",
						"openEuler-20.03-LTS-SP1:rubygem-nokogiri-debugsource-1.10.5-2.oe1.aarch64",
						"openEuler-20.03-LTS-SP1:rubygem-nokogiri-doc-1.10.5-2.oe1.aarch64",
						"openEuler-20.03-LTS-SP1:rubygem-nokogiri-1.10.5-2.oe1.src",
						"openEuler-20.03-LTS-SP1:rubygem-nokogiri-debuginfo-1.10.5-2.oe1.x86_64",
						"openEuler-20.03-LTS-SP1:rubygem-nokogiri-doc-1.10.5-2.oe1.x86_64",
						"openEuler-20.03-LTS-SP1:rubygem-nokogiri-1.10.5-2.oe1.x86_64",
						"openEuler-20.03-LTS-SP1:rubygem-nokogiri-debugsource-1.10.5-2.oe1.x86_64"
					],
					"details":"rubygem-nokogiri security update",
					"category":"vendor_fix",
					"url":"https://openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2021-1144"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":4.3,
						"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
						"version":"3.1"
					},
					"products":[
						"openEuler-20.03-LTS-SP1:rubygem-nokogiri-debuginfo-1.10.5-2.oe1.aarch64",
						"openEuler-20.03-LTS-SP1:rubygem-nokogiri-1.10.5-2.oe1.aarch64",
						"openEuler-20.03-LTS-SP1:rubygem-nokogiri-debugsource-1.10.5-2.oe1.aarch64",
						"openEuler-20.03-LTS-SP1:rubygem-nokogiri-doc-1.10.5-2.oe1.aarch64",
						"openEuler-20.03-LTS-SP1:rubygem-nokogiri-1.10.5-2.oe1.src",
						"openEuler-20.03-LTS-SP1:rubygem-nokogiri-debuginfo-1.10.5-2.oe1.x86_64",
						"openEuler-20.03-LTS-SP1:rubygem-nokogiri-doc-1.10.5-2.oe1.x86_64",
						"openEuler-20.03-LTS-SP1:rubygem-nokogiri-1.10.5-2.oe1.x86_64",
						"openEuler-20.03-LTS-SP1:rubygem-nokogiri-debugsource-1.10.5-2.oe1.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2020-26247"
		}
	]
}