Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2024-39908

Опубликовано: 16 июл. 2024
Источник: debian
EPSS Низкий

Описание

REXML is an XML toolkit for Ruby. The REXML gem before 3.3.1 has some DoS vulnerabilities when it parses an XML that has many specific characters such as `<`, `0` and `%>`. If you need to parse untrusted XMLs, you many be impacted to these vulnerabilities. The REXML gem 3.3.2 or later include the patches to fix these vulnerabilities. Users are advised to upgrade. Users unable to upgrade should avoid parsing untrusted XML strings.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
ruby3.3fixed3.3.5-1package
ruby3.2removedpackage
ruby3.1removedpackage
ruby3.1no-dsabookwormpackage
ruby2.7removedpackage

Примечания

  • https://www.ruby-lang.org/en/news/2024/07/16/dos-rexml-cve-2024-39908/

  • https://github.com/advisories/GHSA-4xqq-m2hx-25v8

  • https://github.com/ruby/rexml/issues/232#issuecomment-2585211411

  • Fixed by commit [1/9] https://github.com/ruby/rexml/commit/b8a5f4cd5c8fe29c65d7a00e67170223d9d2b50e

  • Fixed by commit [2/9] https://github.com/ruby/rexml/commit/0af55fa49d4c9369f90f239a9571edab800ed36e

  • Fixed by commit [3/9] https://github.com/ruby/rexml/commit/c1b64c174ec2e8ca2174c51332670e3be30c865f

  • Fixed by commit [4/9] https://github.com/ruby/rexml/commit/9f1415a2616c77cad44a176eee90e8457b4774b6

  • Fixed by commit [5/9] https://github.com/ruby/rexml/commit/c33ea498102be65082940e8b7d6d31cb2c6e6ee2

  • Fixed by commit [6/9] https://github.com/ruby/rexml/commit/a79ac8b4b42a9efabe33a0be31bd82d33fd50347

  • Fixed by commit [7/9] https://github.com/ruby/rexml/commit/67efb5951ed09dbb575c375b130a1e469f437d1f

  • Fixed by commit [8/9] https://github.com/ruby/rexml/commit/1f1e6e9b40bf339894e843dfd679c2fb1a5ddbf2

  • Fixed by commit [9/9] https://github.com/ruby/rexml/commit/910e5a2b487cb5a30989884a39f9cad2cc499cfc

EPSS

Процентиль: 87%
0.03251
Низкий

Связанные уязвимости

CVSS3: 4.3
ubuntu
11 месяцев назад

REXML is an XML toolkit for Ruby. The REXML gem before 3.3.1 has some DoS vulnerabilities when it parses an XML that has many specific characters such as `<`, `0` and `%>`. If you need to parse untrusted XMLs, you many be impacted to these vulnerabilities. The REXML gem 3.3.2 or later include the patches to fix these vulnerabilities. Users are advised to upgrade. Users unable to upgrade should avoid parsing untrusted XML strings.

CVSS3: 4.3
redhat
11 месяцев назад

REXML is an XML toolkit for Ruby. The REXML gem before 3.3.1 has some DoS vulnerabilities when it parses an XML that has many specific characters such as `<`, `0` and `%>`. If you need to parse untrusted XMLs, you many be impacted to these vulnerabilities. The REXML gem 3.3.2 or later include the patches to fix these vulnerabilities. Users are advised to upgrade. Users unable to upgrade should avoid parsing untrusted XML strings.

CVSS3: 4.3
nvd
11 месяцев назад

REXML is an XML toolkit for Ruby. The REXML gem before 3.3.1 has some DoS vulnerabilities when it parses an XML that has many specific characters such as `<`, `0` and `%>`. If you need to parse untrusted XMLs, you many be impacted to these vulnerabilities. The REXML gem 3.3.2 or later include the patches to fix these vulnerabilities. Users are advised to upgrade. Users unable to upgrade should avoid parsing untrusted XML strings.

CVSS3: 4.3
msrc
8 месяцев назад

Описание отсутствует

CVSS3: 4.3
github
11 месяцев назад

REXML denial of service vulnerability

EPSS

Процентиль: 87%
0.03251
Низкий