Vulnerability Description
libxmljs is vulnerable to a type confusion vulnerability when parsing a specially crafted XML while invoking a function on the result of attrs() that was called on a parsed node. This vulnerability might lead to denial of service (on both 32-bit systems and 64-bit systems), data leak, infinite loop and remote code execution (on 32-bit systems with the XML_PARSE_HUGE flag enabled).
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Libxmljs Project | Libxmljs | < 1.0.11 |
Related Weaknesses (CWE)
References
- https://github.com/libxmljs/libxmljs/issues/645ExploitIssue Tracking
- https://research.jfrog.com/vulnerabilities/libxmljs-attrs-type-confusion-rce-jfsExploitThird Party Advisory
- https://github.com/libxmljs/libxmljs/issues/645ExploitIssue Tracking
- https://research.jfrog.com/vulnerabilities/libxmljs-attrs-type-confusion-rce-jfsExploitThird Party Advisory
FAQ
What is CVE-2024-34391?
CVE-2024-34391 is a vulnerability with a CVSS score of 8.1 (HIGH). libxmljs is vulnerable to a type confusion vulnerability when parsing a specially crafted XML while invoking a function on the result of attrs() that was called on a parsed node. This vulnerability mi...
How severe is CVE-2024-34391?
CVE-2024-34391 has been rated HIGH with a CVSS base score of 8.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-34391?
Check the references section above for vendor advisories and patch information. Affected products include: Libxmljs Project Libxmljs.