Vulnerability Description
REXML is an XML toolkit for Ruby. The REXML gem 3.3.2 has a DoS vulnerability when it parses an XML that has many entity expansions with SAX2 or pull parser API. The REXML gem 3.3.3 or later include the patch to fix the vulnerability.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Ruby-Lang | Rexml | < 3.3.3 |
Related Weaknesses (CWE)
References
- https://github.com/ruby/rexml/commit/033d1909a8f259d5a7c53681bcaf14f13bcf0368Patch
- https://github.com/ruby/rexml/security/advisories/GHSA-5866-49gr-22v4Vendor Advisory
- https://www.ruby-lang.org/en/news/2008/08/23/dos-vulnerability-in-rexmlNot Applicable
- https://www.ruby-lang.org/en/news/2024/08/01/dos-rexml-cve-2024-41946Vendor Advisory
- https://lists.debian.org/debian-lts-announce/2025/01/msg00011.html
- https://security.netapp.com/advisory/ntap-20250117-0007/
FAQ
What is CVE-2024-41946?
CVE-2024-41946 is a vulnerability with a CVSS score of 5.3 (MEDIUM). REXML is an XML toolkit for Ruby. The REXML gem 3.3.2 has a DoS vulnerability when it parses an XML that has many entity expansions with SAX2 or pull parser API. The REXML gem 3.3.3 or later include t...
How severe is CVE-2024-41946?
CVE-2024-41946 has been rated MEDIUM with a CVSS base score of 5.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-41946?
Check the references section above for vendor advisories and patch information. Affected products include: Ruby-Lang Rexml.