REXML is an XML toolkit for Ruby. The REXML gem before 3.3.2 has some DoS vulnerabilities when it parses an XML that has many specific characters such as whitespace character, `>]` and `]>`. The REXML gem 3.3.3 or later include the patches to fix these vulnerabilities.
References
Link | Resource |
---|---|
https://github.com/ruby/rexml/security/advisories/GHSA-4xqq-m2hx-25v8 | Not Applicable |
https://github.com/ruby/rexml/security/advisories/GHSA-r55c-59qm-vjw6 | Vendor Advisory |
https://github.com/ruby/rexml/security/advisories/GHSA-vg3r-rm7w-2xgh | Not Applicable |
https://www.ruby-lang.org/en/news/2024/08/01/dos-rexml-cve-2024-41123 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
05 Sep 2024, 16:12
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/ruby/rexml/security/advisories/GHSA-4xqq-m2hx-25v8 - Not Applicable | |
References | () https://github.com/ruby/rexml/security/advisories/GHSA-r55c-59qm-vjw6 - Vendor Advisory | |
References | () https://github.com/ruby/rexml/security/advisories/GHSA-vg3r-rm7w-2xgh - Not Applicable | |
References | () https://www.ruby-lang.org/en/news/2024/08/01/dos-rexml-cve-2024-41123 - Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
First Time |
Ruby-lang
Ruby-lang rexml |
|
CPE | cpe:2.3:a:ruby-lang:rexml:*:*:*:*:*:ruby:*:* | |
Summary |
|
01 Aug 2024, 15:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-08-01 15:15
Updated : 2024-10-10 12:56
NVD link : CVE-2024-41123
Mitre link : CVE-2024-41123
CVE.ORG link : CVE-2024-41123
JSON object : View
Products Affected
ruby-lang
- rexml
CWE
CWE-400
Uncontrolled Resource Consumption