CVE-2024-41123
ADVISORY - githubSummary
Impact
The REXML gem before 3.3.2 has some DoS vulnerabilities when it parses an XML that has many specific characters such as whitespace character, >] and ]>.
If you need to parse untrusted XMLs, you may be impacted to these vulnerabilities.
Patches
The REXML gem 3.3.3 or later include the patches to fix these vulnerabilities.
Workarounds
Don't parse untrusted XMLs.
References
- https://github.com/ruby/rexml/security/advisories/GHSA-vg3r-rm7w-2xgh : This is a similar vulnerability
- https://github.com/ruby/rexml/security/advisories/GHSA-4xqq-m2hx-25v8 : This is a similar vulnerability
- https://www.ruby-lang.org/en/news/2024/08/01/dos-rexml-cve-2024-41123/: An announce on www.ruby-lang.org
Common Weakness Enumeration (CWE)
Uncontrolled Resource Consumption
Uncontrolled Resource Consumption
NIST
3.9
CVSS SCORE
5.3mediumGitHub
CVSS SCORE
6.9mediumAlpine
-
Debian
-
Ubuntu
3.9
CVSS SCORE
7.5mediumAlma
-
CVSS SCORE
N/AmediumAlma
-
CVSS SCORE
N/AmediumAlma
-
CVSS SCORE
N/AmediumAlma
-
CVSS SCORE
N/AmediumAmazon
-
CVSS SCORE
N/AmediumRed Hat
3.9
CVSS SCORE
5.3mediumRocky
-
CVSS SCORE
N/AlowRocky
-
CVSS SCORE
N/AlowRocky
-
CVSS SCORE
N/AlowRocky
-
CVSS SCORE
N/AlowRocky
-
CVSS SCORE
N/AlowOracle
-
CVSS SCORE
N/AmediumOracle
-
CVSS SCORE
N/AmediumOracle
-
CVSS SCORE
N/AmediumOracle
-
CVSS SCORE
N/AmediumOracle
-
CVSS SCORE
N/AmediumChainguard
CGA-24jw-g87x-3mgj
-
Chainguard
CGA-4p5h-c68j-7r42
-
Chainguard
CGA-53cw-f4vc-x329
-
Chainguard
CGA-5jrw-w32v-8xq4
-
Chainguard
CGA-6824-c465-mr9x
-
Chainguard
CGA-6h5q-rgv8-vx5g
-
Chainguard
CGA-7j6j-656x-j7ph
-
Chainguard
CGA-ccf2-j6hg-pfx6
-
Chainguard
CGA-f453-4qqx-r36p
-
Chainguard
CGA-gvjv-4f2q-v69c
-
Chainguard
CGA-jg48-jr4v-332g
-
Chainguard
CGA-jxrj-xh37-f583
-
Chainguard
CGA-p3m6-66hp-p24w
-
Chainguard
CGA-pmwg-fxg2-3pq2
-
Chainguard
CGA-rf7h-9459-7pw9
-
Chainguard
CGA-vv4v-283v-49f3
-
Chainguard
CGA-vvgg-rx7r-rc2f
-
Chainguard
CGA-w4gw-2rgw-gfxh
-
minimos
MINI-jwh7-xcc4-35p8
-