First published: Tue Jul 16 2024(Updated: )
REXML is an XML toolkit for Ruby. The REXML gem before 3.3.1 has some DoS vulnerabilities when it parses an XML that has many specific characters such as `<`, `0` and `%>`. If you need to parse untrusted XMLs, you many be impacted to these vulnerabilities. The REXML gem 3.3.2 or later include the patches to fix these vulnerabilities. Users are advised to upgrade. Users unable to upgrade should avoid parsing untrusted XML strings.
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
rubygems/rexml | <3.3.2 | 3.3.2 |
debian/ruby2.7 | <=2.7.4-1+deb11u1 | 2.7.4-1+deb11u4 |
debian/ruby3.1 | <=3.1.2-7+deb12u1<=3.1.2-8.5 | |
debian/ruby3.3 | 3.3.7-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-39908 has been classified as a denial-of-service (DoS) vulnerability.
You can fix CVE-2024-39908 by upgrading to REXML gem version 3.3.2 or later.
REXML gem versions before 3.3.2 are affected by CVE-2024-39908.
CVE-2024-39908 presents denial-of-service vulnerabilities due to improper parsing of specific XML characters.
CVE-2024-39908 primarily affects systems using vulnerable REXML versions regardless of the Ruby version.