First published: Mon Oct 28 2024(Updated: )
### Impact The REXML gem before 3.3.9 has a ReDoS vulnerability when it parses an XML that has many digits between `&#` and `x...;` in a hex numeric character reference (`&#x...;`). This does not happen with Ruby 3.2 or later. Ruby 3.1 is the only affected maintained Ruby. Note that Ruby 3.1 will reach EOL on 2025-03. ### Patches The REXML gem 3.3.9 or later include the patch to fix the vulnerability. ### Workarounds Use Ruby 3.2 or later instead of Ruby 3.1. ### References * https://www.ruby-lang.org/en/news/2024/10/28/redos-rexml-cve-2024-49761/: An announce on www.ruby-lang.org
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
rubygems/rexml | <3.3.9 | 3.3.9 |
REXML Ruby | <3.3.9 | |
debian/ruby2.7 | <=2.7.4-1+deb11u1 | 2.7.4-1+deb11u5 |
debian/ruby3.1 | <=3.1.2-7+deb12u1<=3.1.2-8.5 | |
debian/ruby3.3 | <=3.3.7-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-49761 is categorized as a ReDoS vulnerability which may lead to denial of service due to excessive resource consumption during XML parsing.
To mitigate CVE-2024-49761, upgrade the REXML gem to version 3.3.9 or later.
CVE-2024-49761 affects the REXML gem versions prior to 3.3.9, specifically impacting Ruby 3.1 and earlier.
No, CVE-2024-49761 is not present in Ruby 3.2 or later versions.
CVE-2024-49761 can lead to a denial of service for applications that use the vulnerable REXML gem for XML parsing.