First published: Thu Aug 01 2024(Updated: )
### Impact The REXML gem before 3.3.2 has a DoS vulnerability when it parses an XML that has many entity expansions with SAX2 or pull parser API. If you need to parse untrusted XMLs with SAX2 or pull parser API, you may be impacted to this vulnerability. ### Patches The REXML gem 3.3.3 or later include the patch to fix the vulnerability. ### Workarounds Don't parse untrusted XMLs with SAX2 or pull parser API. ### References * https://www.ruby-lang.org/en/news/2008/08/23/dos-vulnerability-in-rexml/ : This is a similar vulnerability * https://www.ruby-lang.org/en/news/2024/08/01/dos-rexml-cve-2024-41946/: An announce on www.ruby-lang.org
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
rubygems/rexml | <3.3.3 | 3.3.3 |
REXML Ruby | <3.3.3 | |
debian/ruby2.7 | <=2.7.4-1+deb11u1 | 2.7.4-1+deb11u5 |
debian/ruby3.1 | <=3.1.2-7+deb12u1<=3.1.2-8.5 | |
debian/ruby3.3 | 3.3.7-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-41946 has been identified as a DoS vulnerability with potential impact on systems parsing untrusted XML.
To mitigate CVE-2024-41946, update the REXML gem to version 3.3.3 or later.
REXML versions prior to 3.3.3 are affected by CVE-2024-41946.
Yes, CVE-2024-41946 can affect Ruby applications that use the REXML gem to parse untrusted XML data.
CVE-2024-41946 can lead to denial of service when parsing XML containing a large number of entity expansions using SAX2 or pull parser API.