Lucene search

K
rubygemsRubySecRUBY:REXML-2024-41946
HistoryJul 31, 2024 - 9:00 p.m.

DoS vulnerabilities in REXML

2024-07-3121:00:00
RubySec
www.ruby-lang.org
3
rexml gem
vulnerability
cve-2024-41946
upgrade
entity expansions
sax2
pull parser
version 3.3.3
naitoh jun
2024

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

EPSS

0.001

Percentile

23.8%

There is a DoS vulnerability in REXML gem.
This vulnerability has been assigned the CVE identifier
CVE-2024-41946. We strongly recommend upgrading the REXML gem.

Details

When parsing an XML that has many entity expansions with SAX2 or
pull parser API, REXML gem may take long time.

Please update REXML gem to version 3.3.3 or later.

Affected versions

  • REXML gem 3.3.2 or prior

Credits

Thanks to NAITOH Jun for discovering and fixing this issue.

History

Originally published at 2024-08-01 03:00:00 (UTC)

Affected configurations

Vulners
Node
rubyrexmlRange3.3.3
VendorProductVersionCPE
rubyrexml*cpe:2.3:a:ruby:rexml:*:*:*:*:*:*:*:*

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

EPSS

0.001

Percentile

23.8%