CVE-2024-41946

Aug. 1, 2024, 4:45 p.m.

Awaiting Analysis
CVE has been recently published to the CVE List and has been received by the NVD.

Products

REXML gem for Ruby

  • 3.3.2

Source

security-advisories@github.com

Tags

CVE-2024-41946 details

Published : Aug. 1, 2024, 3:15 p.m.
Last Modified : Aug. 1, 2024, 4:45 p.m.

Description

REXML is an XML toolkit for Ruby. The REXML gem 3.3.2 has a DoS vulnerability when it parses an XML that has many entity expansions with SAX2 or pull parser API. The REXML gem 3.3.3 or later include the patch to fix the vulnerability.

CVSS Score

1 2 3 4 5.3 6 7 8 9 10

Weakness

Weakness Name Description
CWE-400 Uncontrolled Resource Consumption The product does not properly control the allocation and maintenance of a limited resource, thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources.

CVSS Data

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

LOW

Base Score

5.3

Exploitability Score

3.9

Impact Score

1.4

Base Severity

MEDIUM

This website uses the NVD API, but is not approved or certified by it.