Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2024-49761

Опубликовано: 28 окт. 2024
Источник: redhat
CVSS3: 7.5

Описание

REXML is an XML toolkit for Ruby. The REXML gem before 3.3.9 has a ReDoS vulnerability when it parses an XML that has many digits between &# and x...; in a hex numeric character reference (&#x...;). This does not happen with Ruby 3.2 or later. Ruby 3.1 is the only affected maintained Ruby. The REXML gem 3.3.9 or later include the patch to fix the vulnerability.

A flaw was found in the REXML XML toolkit for Ruby. Parsing XML data containing a large number of digits between &# and x...; in a hex numeric character reference (&#x...;) can trigger a regular expression denial of service (ReDoS) condition, leading to a denial of service.

Отчет

This vulnerability is rated as a moderate severity because it allows attackers to exploit inefficient regex parsing in hex numeric character references (&#x...;), causing a ReDoS and impacting availability, it requires specific malicious input but does not affect confidentiality or integrity. Below listed the component versions and its REXML usage for the different Satellite versions:

  • In Satellite 6.17, 6.16 (for both RHEL 8 and RHEL 9), is used the ReXML version 8.8.1-1 in the Puppet Agent component, therefore we are not affected.
  • In Satellite 6.15 (for RHEL 8), is used the ReXML version 7.28-0-1 in the Puppet Agent component, therefore we are affected
  • In Satellite 6.17, 6.16 (for RHEL 8 and RHEL 9), is used the ReXML version of 8.6.2-2 in the Puppet Server component, therefore we are affected.
  • In Satellite 6.15 (for RHEL 8), is not used the ReXML version of 7.17.2-1, therefore we are not affected. As a conclusion the only affected versions are Satellite 6.17 and 6.16 (for Puppet Server), and Satellite 6.15 (for the Puppet Agent). Any other Satellite versions than this are considered as not-affected.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat 3scale API Management Platform 23scale-amp2/zync-rhel8Affected
Red Hat 3scale API Management Platform 23scale-amp2/zync-rhel9Affected
Red Hat 3scale API Management Platform 23scale-amp-backend-containerNot affected
Red Hat 3scale API Management Platform 23scale-amp-system-containerNot affected
Red Hat 3scale API Management Platform 23scale-toolbox-containerNot affected
Red Hat Enterprise Linux 10rubyNot affected
Red Hat Enterprise Linux 6rubyOut of support scope
Red Hat Enterprise Linux 7rubyOut of support scope
Red Hat Enterprise Linux 8pcsAffected
Red Hat Enterprise Linux 8ruby:3.3/rubyNot affected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-1333

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
ubuntu
10 месяцев назад

REXML is an XML toolkit for Ruby. The REXML gem before 3.3.9 has a ReDoS vulnerability when it parses an XML that has many digits between &# and x...; in a hex numeric character reference (&#x...;). This does not happen with Ruby 3.2 or later. Ruby 3.1 is the only affected maintained Ruby. The REXML gem 3.3.9 or later include the patch to fix the vulnerability.

CVSS3: 7.5
nvd
10 месяцев назад

REXML is an XML toolkit for Ruby. The REXML gem before 3.3.9 has a ReDoS vulnerability when it parses an XML that has many digits between &# and x...; in a hex numeric character reference (&#x...;). This does not happen with Ruby 3.2 or later. Ruby 3.1 is the only affected maintained Ruby. The REXML gem 3.3.9 or later include the patch to fix the vulnerability.

CVSS3: 7.5
msrc
9 месяцев назад

Описание отсутствует

CVSS3: 7.5
debian
10 месяцев назад

REXML is an XML toolkit for Ruby. The REXML gem before 3.3.9 has a ReD ...

CVSS3: 7.5
redos
9 месяцев назад

Уязвимость rubygem-rexml

7.5 High

CVSS3