CVE-2024-43398

Aug. 22, 2024, 3:15 p.m.

Received
CVE has been recently published to the CVE List and has been received by the NVD.

Products

REXML gem for Ruby

  • before 3.3.6

Source

security-advisories@github.com

Tags

CVE-2024-43398 details

Published : Aug. 22, 2024, 3:15 p.m.
Last Modified : Aug. 22, 2024, 3:15 p.m.

Description

REXML is an XML toolkit for Ruby. The REXML gem before 3.3.6 has a DoS vulnerability when it parses an XML that has many deep elements that have same local name attributes. If you need to parse untrusted XMLs with tree parser API like REXML::Document.new, you may be impacted to this vulnerability. If you use other parser APIs such as stream parser API and SAX2 parser API, this vulnerability is not affected. The REXML gem 3.3.6 or later include the patch to fix the vulnerability.

CVSS Score

1 2 3 4 5.9 6 7 8 9 10

Weakness

Weakness Name Description
CWE-776 Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion') The product uses XML documents and allows their structure to be defined with a Document Type Definition (DTD), but it does not properly control the number of recursive definitions of entities.

CVSS Data

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

Base Score

5.9

Exploitability Score

2.2

Impact Score

3.6

Base Severity

MEDIUM

References

URL Source
https://github.com/ruby/rexml/releases/tag/v3.3.6 security-advisories@github.com
https://github.com/ruby/rexml/security/advisories/GHSA-vmwr-mc7x-5vc3 security-advisories@github.com
This website uses the NVD API, but is not approved or certified by it.