REXML is an XML toolkit for Ruby. The REXML gem before 3.3.9 has a ReDoS vulnerability when it parses an XML that has many digits between &# and x...; in a hex numeric character reference (&#x...;). This does not happen with Ruby 3.2 or later. Ruby 3.1 is the only affected maintained Ruby. The REXML gem 3.3.9 or later include the patch to fix the vulnerability.
The product uses a regular expression with an inefficient, possibly exponential worst-case computational complexity that consumes excessive CPU cycles.
Link | Tags |
---|---|
https://github.com/ruby/rexml/security/advisories/GHSA-2rxp-v6pw-ch6m | third party advisory |
https://github.com/ruby/rexml/commit/ce59f2eb1aeb371fe1643414f06618dbe031979f | patch |
https://www.ruby-lang.org/en/news/2024/10/28/redos-rexml-cve-2024-49761 | vendor advisory |
https://security.netapp.com/advisory/ntap-20241227-0004/ | third party advisory |