First published: Thu Aug 22 2024(Updated: )
### Impact The REXML gem before 3.3.6 has a DoS vulnerability when it parses an XML that has many deep elements that have same local name attributes. If you need to parse untrusted XMLs with tree parser API like `REXML::Document.new`, you may be impacted to this vulnerability. If you use other parser APIs such as stream parser API and SAX2 parser API, this vulnerability is not affected. ### Patches The REXML gem 3.3.6 or later include the patch to fix the vulnerability. ### Workarounds Don't parse untrusted XMLs with tree parser API. ### References * https://www.ruby-lang.org/en/news/2024/08/22/dos-rexml-cve-2024-43398/ : An announce on www.ruby-lang.org
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
rubygems/rexml | <3.3.6 | 3.3.6 |
debian/ruby2.7 | <=2.7.4-1+deb11u1 | 2.7.4-1+deb11u4 |
debian/ruby3.1 | <=3.1.2-7+deb12u1<=3.1.2-8.5 | |
debian/ruby3.3 | 3.3.7-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-43398 has a severity rating of moderate, primarily due to its potential to cause a denial of service.
To fix CVE-2024-43398, upgrade the REXML gem to version 3.3.6 or later.
CVE-2024-43398 can lead to a denial of service when parsing deeply nested XML with similar local name attributes.
REXML gem versions prior to 3.3.6 are affected by CVE-2024-43398.
It is not recommended to use REXML for parsing untrusted XML data due to the risk posed by CVE-2024-43398.