Skip to content

Commit

Permalink
Add CVE-2024-49761: ReDoS vulnerability in REXML
Browse files Browse the repository at this point in the history
  • Loading branch information
kou authored and mame committed Oct 28, 2024
1 parent 8937e6e commit 9862c90
Showing 1 changed file with 31 additions and 0 deletions.
31 changes: 31 additions & 0 deletions en/news/_posts/2024-10-28-redos-rexml-cve-2024-49761.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,31 @@
---
layout: news_post
title: "CVE-2024-49761: ReDoS vulnerability in REXML"
author: "kou"
translator:
date: 2024-10-28 03:00:00 +0000
tags: security
lang: en
---

There is a ReDoS vulnerability in REXML gem. This vulnerability has been assigned the CVE identifier [CVE-2024-49761](https://www.cve.org/CVERecord?id=CVE-2024-49761). We strongly recommend upgrading the REXML gem.

This is not happen with Ruby 3.2 or later. Ruby 3.1 is the only affected maintained Ruby. Note that Ruby 3.1 will reach EOL on 2025-03.

## Details

When parsing an XML that has many digits between `&#` and `x...;` in a hex numeric character reference (`&#x...;`).

Please update REXML gem to version 3.3.9 or later.

## Affected versions

* REXML gem 3.3.8 or prior with Ruby 3.1 or prior

## Credits

Thanks to [manun](https://hackerone.com/manun) for discovering this issue.

## History

* Originally published at 2024-10-28 03:00:00 (UTC)

0 comments on commit 9862c90

Please sign in to comment.