Skip to content

REXML DoS vulnerability

Moderate severity GitHub Reviewed Published Aug 1, 2024 in ruby/rexml • Updated Sep 5, 2024

Package

bundler rexml (RubyGems)

Affected versions

< 3.3.3

Patched versions

3.3.3

Description

Impact

The REXML gem before 3.3.2 has a DoS vulnerability when it parses an XML that has many entity expansions with SAX2 or pull parser API.

If you need to parse untrusted XMLs with SAX2 or pull parser API, you may be impacted to this vulnerability.

Patches

The REXML gem 3.3.3 or later include the patch to fix the vulnerability.

Workarounds

Don't parse untrusted XMLs with SAX2 or pull parser API.

References

References

@kou kou published to ruby/rexml Aug 1, 2024
Published by the National Vulnerability Database Aug 1, 2024
Published to the GitHub Advisory Database Aug 2, 2024
Reviewed Aug 2, 2024
Last updated Sep 5, 2024

Severity

Moderate

EPSS score

0.056%
(24th percentile)

CVE ID

CVE-2024-41946

GHSA ID

GHSA-5866-49gr-22v4

Source code

Credits

Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.