CVE-2024-41946
ADVISORY - githubSummary
Impact
The REXML gem before 3.3.2 has a DoS vulnerability when it parses an XML that has many entity expansions with SAX2 or pull parser API.
If you need to parse untrusted XMLs with SAX2 or pull parser API, you may be impacted to this vulnerability.
Patches
The REXML gem 3.3.3 or later include the patch to fix the vulnerability.
Workarounds
Don't parse untrusted XMLs with SAX2 or pull parser API.
References
- https://www.ruby-lang.org/en/news/2008/08/23/dos-vulnerability-in-rexml/ : This is a similar vulnerability
- https://www.ruby-lang.org/en/news/2024/08/01/dos-rexml-cve-2024-41946/: An announce on www.ruby-lang.org
Common Weakness Enumeration (CWE)
Uncontrolled Resource Consumption
Uncontrolled Resource Consumption
NIST
3.9
CVSS SCORE
5.3mediumGitHub
CVSS SCORE
6.9mediumAlpine
-
Debian
-
Ubuntu
3.9
CVSS SCORE
7.5mediumAlma
-
CVSS SCORE
N/AmediumAlma
-
CVSS SCORE
N/AmediumAlma
-
CVSS SCORE
N/AmediumAlma
-
CVSS SCORE
N/AmediumAmazon
-
CVSS SCORE
N/AmediumRed Hat
1.8
CVSS SCORE
3.3lowRocky
-
CVSS SCORE
N/AlowRocky
-
CVSS SCORE
N/AlowRocky
-
CVSS SCORE
N/AlowRocky
-
CVSS SCORE
N/AlowRocky
-
CVSS SCORE
N/AlowOracle
-
CVSS SCORE
N/AmediumOracle
-
CVSS SCORE
N/AmediumOracle
-
CVSS SCORE
N/AmediumOracle
-
CVSS SCORE
N/AmediumOracle
-
CVSS SCORE
N/AmediumChainguard
CGA-3xr5-pwx9-qch9
-
Chainguard
CGA-58gc-r4xx-4mmw
-
Chainguard
CGA-8722-4v4g-8vjr
-
Chainguard
CGA-92q4-5gh7-j3xf
-
Chainguard
CGA-96h6-x8g9-47fv
-
Chainguard
CGA-9v7f-2qj3-xv9f
-
Chainguard
CGA-c6pq-8cfx-9p4v
-
Chainguard
CGA-cqp7-rq6q-883w
-
Chainguard
CGA-crvw-4882-w64x
-
Chainguard
CGA-f7f8-m26x-gx78
-
Chainguard
CGA-fgqg-jcq9-jv3q
-
Chainguard
CGA-fhqv-j9mx-3hfc
-
Chainguard
CGA-m9mr-7fp9-mvh3
-
Chainguard
CGA-q9f2-m4xr-h5pc
-
Chainguard
CGA-v98j-mcmh-g897
-
Chainguard
CGA-vh8v-w8jp-44vq
-
Chainguard
CGA-w364-9xg9-2vmf
-
Chainguard
CGA-w732-86pv-mf62
-
minimos
MINI-6456-2g6w-5fmf
-