Skip to content

Commit 1517707

Browse files
jasnowRubySec CI
authored andcommitted
Updated advisory posts against rubysec/ruby-advisory-db@343e45a
1 parent e89eac4 commit 1517707

File tree

1 file changed

+45
-0
lines changed

1 file changed

+45
-0
lines changed
Lines changed: 45 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,45 @@
1+
---
2+
layout: advisory
3+
title: 'CVE-2024-35176 (rexml): REXML contains a denial of service vulnerability'
4+
comments: false
5+
categories:
6+
- rexml
7+
advisory:
8+
gem: rexml
9+
cve: 2024-35176
10+
ghsa: vg3r-rm7w-2xgh
11+
url: https://github.com/ruby/rexml/security/advisories/GHSA-vg3r-rm7w-2xgh
12+
title: REXML contains a denial of service vulnerability
13+
date: 2024-05-16
14+
description: |
15+
### Impact
16+
17+
The REXML gem before 3.2.6 has a DoS vulnerability when it
18+
parses an XML that has many `<`s in an attribute value.
19+
20+
If you need to parse untrusted XMLs, you many be impacted
21+
to this vulnerability.
22+
23+
### Patches
24+
25+
The REXML gem 3.2.7 or later include the patch to fix this
26+
vulnerability.
27+
28+
### Workarounds
29+
30+
Don't parse untrusted XMLs.
31+
32+
### References
33+
34+
* https://www.ruby-lang.org/en/news/2024/05/16/dos-rexml-cve-2024-35176/
35+
cvss_v3: 5.3
36+
patched_versions:
37+
- ">= 3.2.7"
38+
related:
39+
url:
40+
- https://nvd.nist.gov/vuln/detail/CVE-2024-35176
41+
- https://www.ruby-lang.org/en/news/2024/05/16/dos-rexml-cve-2024-35176
42+
- https://github.com/ruby/rexml/security/advisories/GHSA-vg3r-rm7w-2xgh
43+
- https://github.com/ruby/rexml/commit/4325835f92f3f142ebd91a3fdba4e1f1ab7f1cfb
44+
- https://github.com/advisories/GHSA-vg3r-rm7w-2xgh
45+
---

0 commit comments

Comments
 (0)