CVE-2024-41123: REXML DoS vulnerability
The REXML gem before 3.3.2 has some DoS vulnerabilities when it parses an XML that has many specific characters such as whitespace character, >]
and ]>
.
If you need to parse untrusted XMLs, you may be impacted to these vulnerabilities.
References
- github.com/advisories/GHSA-r55c-59qm-vjw6
- github.com/ruby/rexml
- github.com/ruby/rexml/security/advisories/GHSA-4xqq-m2hx-25v8
- github.com/ruby/rexml/security/advisories/GHSA-r55c-59qm-vjw6
- github.com/ruby/rexml/security/advisories/GHSA-vg3r-rm7w-2xgh
- github.com/rubysec/ruby-advisory-db/blob/master/gems/rexml/CVE-2024-41123.yml
- nvd.nist.gov/vuln/detail/CVE-2024-41123
- www.ruby-lang.org/en/news/2024/08/01/dos-rexml-cve-2024-41123
Detect and mitigate CVE-2024-41123 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →