Lucene search

K
rubygemsRubySecRUBY:REXML-2024-39908
HistoryJul 15, 2024 - 9:00 p.m.

DoS in REXML

2024-07-1521:00:00
RubySec
github.com
9
dos vulnerability
rexml gem
upgrade
cve-2024-39908
xml parsing

CVSS3

4.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L

AI Score

7.2

Confidence

Low

EPSS

0

Percentile

9.3%

There is a DoS vulnerability in REXML gem. This vulnerability has
been assigned the CVE identifier CVE-2024-39908. We strongly
recommend upgrading the REXML gem.

Details

When it parses an XML that has many specific characters such as
<, 0 and %>. REXML gem may take long time.

Please update REXML gem to version 3.3.2 or later.

Affected versions

REXML gem 3.3.2 or prior

Credits

Thanks to mprogrammer for discovering this issue.

History

Originally published at 2024-07-16 03:00:00 (UTC)

Affected configurations

Vulners
Node
rubyrexmlRange3.3.2
VendorProductVersionCPE
rubyrexml*cpe:2.3:a:ruby:rexml:*:*:*:*:*:*:*:*

CVSS3

4.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L

AI Score

7.2

Confidence

Low

EPSS

0

Percentile

9.3%