First published: Mon Apr 05 2021(Updated: )
The REXML gem before 3.2.5 in Ruby before 2.6.7, 2.7.x before 2.7.3, and 3.x before 3.0.1 does not properly address XML round-trip issues. An incorrect document can be produced after parsing and serializing.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/rh-ruby25-ruby | <0:2.5.9-9.el7 | 0:2.5.9-9.el7 |
redhat/rh-ruby27-ruby | <0:2.7.3-129.el7 | 0:2.7.3-129.el7 |
redhat/rh-ruby26-ruby | <0:2.6.7-119.el7 | 0:2.6.7-119.el7 |
redhat/ruby | <2.5.9 | 2.5.9 |
redhat/ruby | <2.6.7 | 2.6.7 |
redhat/ruby | <2.7.3 | 2.7.3 |
redhat/ruby | <3.0.1 | 3.0.1 |
redhat/rubygem-rexml | <3.2.5 | 3.2.5 |
REXML Ruby | <3.2.5 | |
Ruby | <2.6.7 | |
Ruby | >=2.7.0<2.7.3 | |
Ruby | >=3.0.0<3.0.1 | |
Fedora | =34 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2021-28965 is a vulnerability that affects the REXML gem in Ruby before versions 2.6.7, 2.7.x before 2.7.3, and 3.x before 3.0.1. It allows an attacker to modify the structure of an XML document, potentially compromising the integrity of processed data.
CVE-2021-28965 can affect applications that use the REXML library in Ruby. When parsing a specially crafted XML document and writing the parsed data back to a new XML document, the resulting document may have a different structure, compromising the integrity of the processed data.
CVE-2021-28965 has a severity of 'high' with a CVSS score of 7.0.
To fix CVE-2021-28965, update Ruby to version 2.5.9, 2.6.7, 2.7.3, or 3.0.1, and update the rubygem-rexml package to version 3.2.5.
You can find more information about CVE-2021-28965 at the following references: [CVE-2021-28965](https://www.cve.org/CVERecord?id=CVE-2021-28965), [NVD](https://nvd.nist.gov/vuln/detail/CVE-2021-28965), [Red Hat Bugzilla](https://bugzilla.redhat.com/show_bug.cgi?id=1947526), [Red Hat Security Advisory](https://access.redhat.com/errata/RHSA-2021:2584).