Vulnerability Description
The REXML gem before 3.2.5 in Ruby before 2.6.7, 2.7.x before 2.7.3, and 3.x before 3.0.1 does not properly address XML round-trip issues. An incorrect document can be produced after parsing and serializing.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Ruby-Lang | Rexml | < 3.2.5 |
| Ruby-Lang | Ruby | < 2.6.7 |
| Fedoraproject | Fedora | 34 |
References
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- https://security.netapp.com/advisory/ntap-20210528-0003/Third Party Advisory
- https://www.ruby-lang.org/en/news/2021/04/05/xml-round-trip-vulnerability-in-rexVendor Advisory
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- https://security.netapp.com/advisory/ntap-20210528-0003/Third Party Advisory
- https://www.ruby-lang.org/en/news/2021/04/05/xml-round-trip-vulnerability-in-rexVendor Advisory
FAQ
What is CVE-2021-28965?
CVE-2021-28965 is a vulnerability with a CVSS score of 7.5 (HIGH). The REXML gem before 3.2.5 in Ruby before 2.6.7, 2.7.x before 2.7.3, and 3.x before 3.0.1 does not properly address XML round-trip issues. An incorrect document can be produced after parsing and seria...
How severe is CVE-2021-28965?
CVE-2021-28965 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-28965?
Check the references section above for vendor advisories and patch information. Affected products include: Ruby-Lang Rexml, Ruby-Lang Ruby, Fedoraproject Fedora.