Skip to content

REXML DoS vulnerability

Moderate severity GitHub Reviewed Published Aug 1, 2024 in ruby/rexml • Updated Sep 5, 2024

Package

bundler rexml (RubyGems)

Affected versions

< 3.3.3

Patched versions

3.3.3

Description

Impact

The REXML gem before 3.3.2 has some DoS vulnerabilities when it parses an XML that has many specific characters such as whitespace character, >] and ]>.

If you need to parse untrusted XMLs, you may be impacted to these vulnerabilities.

Patches

The REXML gem 3.3.3 or later include the patches to fix these vulnerabilities.

Workarounds

Don't parse untrusted XMLs.

References

References

@kou kou published to ruby/rexml Aug 1, 2024
Published by the National Vulnerability Database Aug 1, 2024
Published to the GitHub Advisory Database Aug 1, 2024
Reviewed Aug 1, 2024
Last updated Sep 5, 2024

Severity

Moderate

EPSS score

0.056%
(24th percentile)

CVE ID

CVE-2024-41123

GHSA ID

GHSA-r55c-59qm-vjw6

Source code

Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.