REXML is an XML toolkit for Ruby. The REXML gem before 3.2.6 has a denial of service vulnerability when it parses an XML that has many `<`s in an attribute value. Those who need to parse untrusted XMLs may be impacted to this vulnerability. The REXML gem 3.2.7 or later include the patch to fix this vulnerability. As a workaround, don't parse untrusted XMLs.
References
Configurations
No configuration.
History
21 Nov 2024, 09:19
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
References | () https://github.com/ruby/rexml/commit/4325835f92f3f142ebd91a3fdba4e1f1ab7f1cfb - | |
References | () https://github.com/ruby/rexml/security/advisories/GHSA-vg3r-rm7w-2xgh - | |
References | () https://www.ruby-lang.org/en/news/2024/05/16/dos-rexml-cve-2024-35176 - |
16 May 2024, 16:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-05-16 16:15
Updated : 2024-11-21 09:19
NVD link : CVE-2024-35176
Mitre link : CVE-2024-35176
CVE.ORG link : CVE-2024-35176
JSON object : View
Products Affected
No product.