Lucene search

K
rubygemsRubySecRUBY:REXML-2021-28965
HistoryApr 04, 2021 - 9:00 p.m.

XML round-trip vulnerability in REXML

2021-04-0421:00:00
RubySec
www.ruby-lang.org
10
xml
rexml
vulnerability
parsing
serializing
ruby
gem

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

When parsing and serializing a crafted XML document, REXML gem (including
the one bundled with Ruby) can create a wrong XML document whose structure
is different from the original one.

Affected configurations

Vulners
Node
rubyrexmlRange3.1.03.1.9.1
OR
rubyrexmlRange3.2.03.2.3.1
OR
rubyrexmlRange3.2.5
VendorProductVersionCPE
rubyrexml*cpe:2.3:a:ruby:rexml:*:*:*:*:*:*:*:*

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N