Products
REXML gem for Ruby
- 3.3.2
Source
security-advisories@github.com
Tags
CVE-2024-41946 details
Published : Aug. 1, 2024, 3:15 p.m.
Last Modified : Aug. 1, 2024, 4:45 p.m.
Last Modified : Aug. 1, 2024, 4:45 p.m.
Description
REXML is an XML toolkit for Ruby. The REXML gem 3.3.2 has a DoS vulnerability when it parses an XML that has many entity expansions with SAX2 or pull parser API. The REXML gem 3.3.3 or later include the patch to fix the vulnerability.
CVSS Score
1 | 2 | 3 | 4 | 5.3 | 6 | 7 | 8 | 9 | 10 |
---|
Weakness
Weakness | Name | Description |
---|---|---|
CWE-400 | Uncontrolled Resource Consumption | The product does not properly control the allocation and maintenance of a limited resource, thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources. |
CVSS Data
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
LOW
Base Score
5.3
Exploitability Score
3.9
Impact Score
1.4
Base Severity
MEDIUM
Vector String : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
References
URL | Source |
---|---|
https://github.com/ruby/rexml/commit/033d1909a8f259d5a7c53681bcaf14f13bcf0368 | security-advisories@github.com |
https://github.com/ruby/rexml/security/advisories/GHSA-5866-49gr-22v4 | security-advisories@github.com |
https://www.ruby-lang.org/en/news/2008/08/23/dos-vulnerability-in-rexml | security-advisories@github.com |
https://www.ruby-lang.org/en/news/2024/08/01/dos-rexml-cve-2024-41946 | security-advisories@github.com |
This website uses the NVD API, but is not approved or certified by it.