CVE-2024-35176
REXML contains a denial of service vulnerability
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
REXML is an XML toolkit for Ruby. The REXML gem before 3.2.6 has a denial of service vulnerability when it parses an XML that has many `<`s in an attribute value. Those who need to parse untrusted XMLs may be impacted to this vulnerability. The REXML gem 3.2.7 or later include the patch to fix this vulnerability. As a workaround, don't parse untrusted XMLs.
REXML es un conjunto de herramientas XML para Ruby. La gema REXML anterior a 3.2.6 tiene una vulnerabilidad de denegación de servicio cuando analiza un XML que tiene muchos `<` en un valor de atributo. Aquellos que necesiten analizar archivos XML que no sean de confianza pueden verse afectados por esta vulnerabilidad. La gema REXML 3.2.7 o posterior incluye el parche para corregir esta vulnerabilidad. Como solución alternativa, no analice archivos XML que no sean de confianza.
REXML is an XML toolkit for Ruby. The REXML gem before 3.2.6 has a denial of service vulnerability when it parses an XML that has many `<`s in an attribute value. Those who need to parse untrusted XMLs may be impacted to this vulnerability. The REXML gem 3.2.7 or later include the patch to fix this vulnerability. As a workaround, don't parse untrusted XMLs.
USN-7091-1 fixed several vulnerabilities in Ruby. This update provides the corresponding update for ruby2.7 in Ubuntu 20.04 LTS. It was discovered that Ruby incorrectly handled parsing of an XML document that has specific XML characters in an attribute value using REXML gem. An attacker could use this issue to cause Ruby to crash, resulting in a denial of service. This issue only affected in Ubuntu 22.04 LTS and Ubuntu 24.04 LTS. It was discovered that Ruby incorrectly handled parsing of an XML document that has many entity expansions with SAX2 or pull parser API. An attacker could use this issue to cause Ruby to crash, resulting in a denial of service. It was discovered that Ruby incorrectly handled parsing of an XML document that has many digits in a hex numeric character reference. An attacker could use this issue to cause Ruby to crash, resulting in a denial of service.
CVSS Scores
SSVC
- Decision:Attend
Timeline
- 2024-05-10 CVE Reserved
- 2024-05-16 CVE Published
- 2024-12-20 First Exploit
- 2025-03-07 CVE Updated
- 2025-07-04 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-400: Uncontrolled Resource Consumption
- CWE-770: Allocation of Resources Without Limits or Throttling
CAPEC
References (6)
URL | Tag | Source |
---|---|---|
https://github.com/ruby/rexml/commit/4325835f92f3f142ebd91a3fdba4e1f1ab7f1cfb | X_refsource_misc | |
https://github.com/ruby/rexml/security/advisories/GHSA-vg3r-rm7w-2xgh | X_refsource_confirm | |
https://www.ruby-lang.org/en/news/2024/05/16/dos-rexml-cve-2024-35176 | X_refsource_misc |
URL | Date | SRC |
---|---|---|
https://github.com/SpiralBL0CK/CVE-2024-35176 | 2024-12-20 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://access.redhat.com/security/cve/CVE-2024-35176 | 2024-08-13 | |
https://bugzilla.redhat.com/show_bug.cgi?id=2280894 | 2024-08-13 |