First published: Thu May 16 2024(Updated: )
REXML is an XML toolkit for Ruby. The REXML gem before 3.2.6 has a denial of service vulnerability when it parses an XML that has many `<`s in an attribute value. Those who need to parse untrusted XMLs may be impacted to this vulnerability. The REXML gem 3.2.7 or later include the patch to fix this vulnerability. As a workaround, don't parse untrusted XMLs.
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/REXML | <3.2.7 | 3.2.7 |
rubygems/rexml | <3.2.7 | 3.2.7 |
debian/ruby2.7 | <=2.7.4-1+deb11u1 | 2.7.4-1+deb11u5 |
debian/ruby3.1 | <=3.1.2-7+deb12u1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-35176 has a denial of service (DoS) severity, affecting the REXML gem versions prior to 3.2.7.
To fix CVE-2024-35176, upgrade the REXML gem to version 3.2.7 or later.
Users of REXML gem versions before 3.2.7 that parse untrusted XML data are particularly affected by CVE-2024-35176.
REXML gem versions earlier than 3.2.7 are vulnerable to CVE-2024-35176.
If you cannot update REXML, consider using other XML parsing libraries that do not have this vulnerability.