File tree Expand file tree Collapse file tree 1 file changed +52
-0
lines changed Expand file tree Collapse file tree 1 file changed +52
-0
lines changed Original file line number Diff line number Diff line change 1+ ---
2+ gem : rexml
3+ cve : 2024-43398
4+ ghsa : vmwr-mc7x-5vc3
5+ url : https://github.com/ruby/rexml/security/advisories/GHSA-vmwr-mc7x-5vc3
6+ title : REXML denial of service vulnerability
7+ date : 2024-08-22
8+ description : |
9+ ### Impact
10+
11+ The REXML gem before 3.3.6 has a DoS vulnerability when it parses an
12+ XML that has many deep elements that have same local name attributes.
13+
14+ If you need to parse untrusted XMLs with tree parser API like
15+ `REXML::Document.new`, you may be impacted to this vulnerability.
16+ If you use other parser APIs such as stream parser API and SAX2
17+ parser API, this vulnerability is not affected.
18+
19+ This vulnerability has been assigned the CVE identifier CVE-2024-43398.
20+ We strongly recommend upgrading the REXML gem.
21+
22+ ### Patches
23+
24+ The REXML gem 3.3.6 or later include the patch to fix the
25+ vulnerability.
26+
27+ ### Workarounds
28+
29+ Don't parse untrusted XMLs with tree parser API.
30+
31+ ## Affected versions
32+
33+ REXML gem 3.3.5 or prior
34+
35+ ## Credits
36+
37+ Thanks to l33thaxor for discovering this issue.
38+
39+ ## History
40+
41+ Originally published at 2024-08-22 03:00:00 (UTC)
42+ cvss_v3 : 5.9
43+ patched_versions :
44+ - " >= 3.3.6"
45+ related :
46+ url :
47+ - https://nvd.nist.gov/vuln/detail/CVE-2024-43398
48+ - https://www.ruby-lang.org/en/news/2024/08/22/dos-rexml-cve-2024-43398
49+ - https://github.com/ruby/rexml/security/advisories/GHSA-vmwr-mc7x-5vc3
50+ - https://github.com/ruby/rexml/commit/7cb5eaeb221c322b9912f724183294d8ce96bae3
51+ - https://github.com/ruby/rexml/releases/tag/v3.3.6
52+ - https://github.com/advisories/GHSA-vmwr-mc7x-5vc3
You can’t perform that action at this time.
0 commit comments