Lucene search

K
rubygemsRubySecRUBY:REXML-2024-41123
HistoryJul 31, 2024 - 9:00 p.m.

DoS vulnerabilities in REXML

2024-07-3121:00:00
RubySec
www.ruby-lang.org
3
rexml gem
dos vulnerabilities
cve-2024-41123
upgrade

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

AI Score

5.7

Confidence

High

EPSS

0.001

Percentile

23.8%

There are some DoS vulnerabilities in REXML gem.
These vulnerabilities have been assigned the CVE identifier
CVE-2024-41123. We strongly recommend upgrading the REXML gem.

Details

When parsing an XML document that has many specific characters such
as whitespace character, >] and ]>, REXML gem may take long time.

Please update REXML gem to version 3.3.3 or later.

Affected versions

  • REXML gem 3.3.2 or prior

Credits

Thanks to mprogrammer and scyoon for discovering these issues.

History

Originally published at 2024-08-01 03:00:00 (UTC)

Affected configurations

Vulners
Node
rubyrexmlRange3.3.3
VendorProductVersionCPE
rubyrexml*cpe:2.3:a:ruby:rexml:*:*:*:*:*:*:*:*

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

AI Score

5.7

Confidence

High

EPSS

0.001

Percentile

23.8%