Vulnerability Description
REXML is an XML toolkit for Ruby. The REXML gem before 3.3.2 has some DoS vulnerabilities when it parses an XML that has many specific characters such as whitespace character, `>]` and `]>`. The REXML gem 3.3.3 or later include the patches to fix these vulnerabilities.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Ruby-Lang | Rexml | < 3.2.7 |
Related Weaknesses (CWE)
References
- https://github.com/ruby/rexml/security/advisories/GHSA-4xqq-m2hx-25v8Not Applicable
- https://github.com/ruby/rexml/security/advisories/GHSA-r55c-59qm-vjw6Vendor Advisory
- https://github.com/ruby/rexml/security/advisories/GHSA-vg3r-rm7w-2xghNot Applicable
- https://www.ruby-lang.org/en/news/2024/08/01/dos-rexml-cve-2024-41123Vendor Advisory
- https://lists.debian.org/debian-lts-announce/2025/01/msg00011.html
- https://security.netapp.com/advisory/ntap-20241227-0005/
FAQ
What is CVE-2024-41123?
CVE-2024-41123 is a vulnerability with a CVSS score of 5.3 (MEDIUM). REXML is an XML toolkit for Ruby. The REXML gem before 3.3.2 has some DoS vulnerabilities when it parses an XML that has many specific characters such as whitespace character, `>]` and `]>`. The REXML...
How severe is CVE-2024-41123?
CVE-2024-41123 has been rated MEDIUM with a CVSS base score of 5.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-41123?
Check the references section above for vendor advisories and patch information. Affected products include: Ruby-Lang Rexml.