Lucene search

K
hackeroneMprogrammerH1:2645836
HistoryAug 07, 2024 - 8:47 p.m.

Internet Bug Bounty: [CVE-2024-35176] DoS vulnerability in REXML

2024-08-0720:47:47
mprogrammer
hackerone.com
$2142
18
internet bug bounty
cve-2024-35176
dos vulnerability
rexml
parser
denial of service
rails
xml
hash

CVSS3

5.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

AI Score

7

Confidence

High

I sent my original report here: https://hackerone.com/reports/2490560
REXML had a vulnerability where repeated > characters in an attribute value took a very long time for the parser to finish.
The wait times increased exponentially the larger the string.

Impact

Reduced performance or Denial of Service was possible where REXML is used to parse user input.
Rails uses REXML to convert XML to a hash, so this was susceptible:

Hash.from_xml(request.body.read)

CVSS3

5.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

AI Score

7

Confidence

High