CVE-2024-49761

Name
CVE-2024-49761
Description
REXML is an XML toolkit for Ruby. The REXML gem before 3.3.9 has a ReDoS vulnerability when it parses an XML that has many digits between &# and x...; in a hex numeric character reference (&#x...;). This does not happen with Ruby 3.2 or later. Ruby 3.1 is the only affected maintained Ruby. The REXML gem 3.3.9 or later include the patch to fix the vulnerability.
NVD Severity
unknown
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
CONFIRM https://github.com/ruby/rexml/security/advisories/GHSA-2rxp-v6pw-ch6m
MISC https://github.com/ruby/rexml/commit/ce59f2eb1aeb371fe1643414f06618dbe031979f
MISC https://www.ruby-lang.org/en/news/2024/10/28/redos-rexml-cve-2024-49761
af854a3a-2127-422b-91ae-364da2661108 https://security.netapp.com/advisory/ntap-20241227-0004/

Match rules

CPE URI Source package Min version Max version
rexml >= 0 < 3.3.9
cpe:2.3:a:ruby-lang:rexml:*:*:*:*:*:ruby:*:* ruby-rexml >= None < 3.3.9

Vulnerable and fixed packages

Source package Branch Version Maintainer Status
ruby-rexml edge-main 3.3.9-r0 Jakub Jirutka <jakub@jirutka.cz> fixed
ruby-rexml 3.21-main 3.3.9-r0 Jakub Jirutka <jakub@jirutka.cz> fixed