Skip to content

REXML denial of service vulnerability

Moderate severity GitHub Reviewed Published Aug 22, 2024 in ruby/rexml • Updated Aug 28, 2024

Package

bundler rexml (RubyGems)

Affected versions

< 3.3.6

Patched versions

3.3.6

Description

Impact

The REXML gem before 3.3.6 has a DoS vulnerability when it parses an XML that has many deep elements that have same local name attributes.

If you need to parse untrusted XMLs with tree parser API like REXML::Document.new, you may be impacted to this vulnerability. If you use other parser APIs such as stream parser API and SAX2 parser API, this vulnerability is not affected.

Patches

The REXML gem 3.3.6 or later include the patch to fix the vulnerability.

Workarounds

Don't parse untrusted XMLs with tree parser API.

References

References

@kou kou published to ruby/rexml Aug 22, 2024
Published by the National Vulnerability Database Aug 22, 2024
Published to the GitHub Advisory Database Aug 22, 2024
Reviewed Aug 22, 2024
Last updated Aug 28, 2024

Severity

Moderate

EPSS score

0.043%
(10th percentile)

Weaknesses

CVE ID

CVE-2024-43398

GHSA ID

GHSA-vmwr-mc7x-5vc3

Source code

Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.