THREATINT

We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Fathom (Privacy friendly web analytics)
Zendesk (Helpdesk and Chat)

Ok

Home | EN
Support
CVE
PUBLISHED

CVE-2024-35176

REXML contains a denial of service vulnerability

AssignerGitHub_M
Reserved2024-05-10
Published2024-05-16
Updated2024-06-04

Description

REXML is an XML toolkit for Ruby. The REXML gem before 3.2.6 has a denial of service vulnerability when it parses an XML that has many `<`s in an attribute value. Those who need to parse untrusted XMLs may be impacted to this vulnerability. The REXML gem 3.2.7 or later include the patch to fix this vulnerability. As a workaround, don't parse untrusted XMLs.



MEDIUM: 5.3CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

Problem types

CWE-400: Uncontrolled Resource Consumption

CWE-770: Allocation of Resources Without Limits or Throttling

Product status

< 3.2.7
affected

References

https://github.com/ruby/rexml/security/advisories/GHSA-vg3r-rm7w-2xgh

https://github.com/ruby/rexml/commit/4325835f92f3f142ebd91a3fdba4e1f1ab7f1cfb

https://www.ruby-lang.org/en/news/2024/05/16/dos-rexml-cve-2024-35176

cve.org CVE-2024-35176

nvd.nist.gov CVE-2024-35176

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-35176
© Copyright 2024 THREATINT. Made in Cyprus with +