CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
AI Score
Confidence
Low
EPSS
Percentile
23.8%
The REXML gem before 3.3.2 has some DoS vulnerabilities when it parses an XML that has many specific characters such as whitespace character, >]
and ]>
.
If you need to parse untrusted XMLs, you may be impacted to these vulnerabilities.
The REXML gem 3.3.3 or later include the patches to fix these vulnerabilities.
Don’t parse untrusted XMLs.
github.com/ruby/rexml
github.com/ruby/rexml/security/advisories/GHSA-4xqq-m2hx-25v8
github.com/ruby/rexml/security/advisories/GHSA-r55c-59qm-vjw6
github.com/ruby/rexml/security/advisories/GHSA-vg3r-rm7w-2xgh
github.com/rubysec/ruby-advisory-db/blob/master/gems/rexml/CVE-2024-41123.yml
nvd.nist.gov/vuln/detail/CVE-2024-41123
www.ruby-lang.org/en/news/2024/08/01/dos-rexml-cve-2024-41123
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
AI Score
Confidence
Low
EPSS
Percentile
23.8%