First published: Thu Aug 01 2024(Updated: )
### Impact The REXML gem before 3.3.2 has some DoS vulnerabilities when it parses an XML that has many specific characters such as whitespace character, `>]` and `]>`. If you need to parse untrusted XMLs, you may be impacted to these vulnerabilities. ### Patches The REXML gem 3.3.3 or later include the patches to fix these vulnerabilities. ### Workarounds Don't parse untrusted XMLs. ### References * https://github.com/ruby/rexml/security/advisories/GHSA-vg3r-rm7w-2xgh : This is a similar vulnerability * https://github.com/ruby/rexml/security/advisories/GHSA-4xqq-m2hx-25v8 : This is a similar vulnerability * https://www.ruby-lang.org/en/news/2024/08/01/dos-rexml-cve-2024-41123/: An announce on www.ruby-lang.org
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
rubygems/rexml | <3.3.3 | 3.3.3 |
F5 Traffix Systems Signaling Delivery Controller | =5.2 | |
REXML Ruby | <3.2.7 | |
REXML Ruby | >=3.2.8<3.3.2 | |
debian/ruby2.7 | <=2.7.4-1+deb11u1 | 2.7.4-1+deb11u4 |
debian/ruby3.1 | <=3.1.2-7+deb12u1<=3.1.2-8.5 | |
debian/ruby3.3 | 3.3.7-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-41123 has been identified as a Denial of Service (DoS) vulnerability.
To mitigate CVE-2024-41123, upgrade the REXML gem to version 3.3.3 or later.
CVE-2024-41123 affects REXML gem versions prior to 3.3.2.
Applications using vulnerable versions of the REXML gem for parsing untrusted XML are at risk due to CVE-2024-41123.
There are no specific temporary workarounds recommended for CVE-2024-41123; upgrading to a fixed version is advised.