Skip to content

Commit 343e45a

Browse files
jasnowpostmodern
authored andcommitted
GHSA SYNC: 1 brand new advisory
1 parent 33eda20 commit 343e45a

File tree

1 file changed

+38
-0
lines changed

1 file changed

+38
-0
lines changed

gems/rexml/CVE-2024-35176.yml

Lines changed: 38 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,38 @@
1+
---
2+
gem: rexml
3+
cve: 2024-35176
4+
ghsa: vg3r-rm7w-2xgh
5+
url: https://github.com/ruby/rexml/security/advisories/GHSA-vg3r-rm7w-2xgh
6+
title: REXML contains a denial of service vulnerability
7+
date: 2024-05-16
8+
description: |
9+
### Impact
10+
11+
The REXML gem before 3.2.6 has a DoS vulnerability when it
12+
parses an XML that has many `<`s in an attribute value.
13+
14+
If you need to parse untrusted XMLs, you many be impacted
15+
to this vulnerability.
16+
17+
### Patches
18+
19+
The REXML gem 3.2.7 or later include the patch to fix this
20+
vulnerability.
21+
22+
### Workarounds
23+
24+
Don't parse untrusted XMLs.
25+
26+
### References
27+
28+
* https://www.ruby-lang.org/en/news/2024/05/16/dos-rexml-cve-2024-35176/
29+
cvss_v3: 5.3
30+
patched_versions:
31+
- ">= 3.2.7"
32+
related:
33+
url:
34+
- https://nvd.nist.gov/vuln/detail/CVE-2024-35176
35+
- https://www.ruby-lang.org/en/news/2024/05/16/dos-rexml-cve-2024-35176
36+
- https://github.com/ruby/rexml/security/advisories/GHSA-vg3r-rm7w-2xgh
37+
- https://github.com/ruby/rexml/commit/4325835f92f3f142ebd91a3fdba4e1f1ab7f1cfb
38+
- https://github.com/advisories/GHSA-vg3r-rm7w-2xgh

0 commit comments

Comments
 (0)