File tree Expand file tree Collapse file tree 1 file changed +52
-0
lines changed Expand file tree Collapse file tree 1 file changed +52
-0
lines changed Original file line number Diff line number Diff line change
1
+ ---
2
+ gem : rexml
3
+ cve : 2024-43398
4
+ ghsa : vmwr-mc7x-5vc3
5
+ url : https://github.com/ruby/rexml/security/advisories/GHSA-vmwr-mc7x-5vc3
6
+ title : REXML denial of service vulnerability
7
+ date : 2024-08-22
8
+ description : |
9
+ ### Impact
10
+
11
+ The REXML gem before 3.3.6 has a DoS vulnerability when it parses an
12
+ XML that has many deep elements that have same local name attributes.
13
+
14
+ If you need to parse untrusted XMLs with tree parser API like
15
+ `REXML::Document.new`, you may be impacted to this vulnerability.
16
+ If you use other parser APIs such as stream parser API and SAX2
17
+ parser API, this vulnerability is not affected.
18
+
19
+ This vulnerability has been assigned the CVE identifier CVE-2024-43398.
20
+ We strongly recommend upgrading the REXML gem.
21
+
22
+ ### Patches
23
+
24
+ The REXML gem 3.3.6 or later include the patch to fix the
25
+ vulnerability.
26
+
27
+ ### Workarounds
28
+
29
+ Don't parse untrusted XMLs with tree parser API.
30
+
31
+ ## Affected versions
32
+
33
+ REXML gem 3.3.5 or prior
34
+
35
+ ## Credits
36
+
37
+ Thanks to l33thaxor for discovering this issue.
38
+
39
+ ## History
40
+
41
+ Originally published at 2024-08-22 03:00:00 (UTC)
42
+ cvss_v3 : 5.9
43
+ patched_versions :
44
+ - " >= 3.3.6"
45
+ related :
46
+ url :
47
+ - https://nvd.nist.gov/vuln/detail/CVE-2024-43398
48
+ - https://www.ruby-lang.org/en/news/2024/08/22/dos-rexml-cve-2024-43398
49
+ - https://github.com/ruby/rexml/security/advisories/GHSA-vmwr-mc7x-5vc3
50
+ - https://github.com/ruby/rexml/commit/7cb5eaeb221c322b9912f724183294d8ce96bae3
51
+ - https://github.com/ruby/rexml/releases/tag/v3.3.6
52
+ - https://github.com/advisories/GHSA-vmwr-mc7x-5vc3
You can’t perform that action at this time.
0 commit comments