Skip to content

Commit 2a45aa9

Browse files
jasnowRubySec CI
authored and
RubySec CI
committed
Updated advisory posts against rubysec/ruby-advisory-db@8c2227f
1 parent 9ef1686 commit 2a45aa9

File tree

2 files changed

+89
-0
lines changed

2 files changed

+89
-0
lines changed
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,47 @@
1+
---
2+
layout: advisory
3+
title: 'CVE-2024-49761 (rexml): REXML ReDoS vulnerability'
4+
comments: false
5+
categories:
6+
- rexml
7+
advisory:
8+
gem: rexml
9+
cve: 2024-49761
10+
ghsa: 2rxp-v6pw-ch6m
11+
url: https://github.com/ruby/rexml/security/advisories/GHSA-2rxp-v6pw-ch6m
12+
title: REXML ReDoS vulnerability
13+
date: 2024-10-28
14+
description: |
15+
## Impact
16+
17+
The REXML gem before 3.3.9 has a ReDoS vulnerability when it
18+
parses an XML that has many digits between `&#` and `x...;`
19+
in a hex numeric character reference (`&#x...;`).
20+
21+
This does not happen with Ruby 3.2 or later. Ruby 3.1 is the only
22+
affected maintained Ruby. Note that Ruby 3.1 will reach EOL on 2025-03.
23+
24+
## Patches
25+
26+
The REXML gem 3.3.9 or later include the patch to fix the vulnerability.
27+
28+
## Workarounds
29+
30+
Use Ruby 3.2 or later instead of Ruby 3.1.
31+
32+
## References
33+
34+
* https://www.ruby-lang.org/en/news/2024/10/28/redos-rexml-cve-2024-49761
35+
* Announced on www.ruby-lang.org.
36+
cvss_v4: 6.6
37+
patched_versions:
38+
- ">= 3.3.9"
39+
related:
40+
url:
41+
- https://nvd.nist.gov/vuln/detail/CVE-2024-49761
42+
- https://github.com/ruby/rexml/releases/tag/v3.3.9
43+
- https://github.com/ruby/rexml/security/advisories/GHSA-2rxp-v6pw-ch6m
44+
- https://github.com/ruby/rexml/commit/ce59f2eb1aeb371fe1643414f06618dbe031979f
45+
- https://www.ruby-lang.org/en/news/2024/10/28/redos-rexml-cve-2024-49761
46+
- https://github.com/advisories/GHSA-2rxp-v6pw-ch6m
47+
---
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,42 @@
1+
---
2+
layout: advisory
3+
title: 'CVE-2024-49771 (mpxj): MPXJ has a Potential Path Traversal Vulnerability'
4+
comments: false
5+
categories:
6+
- mpxj
7+
advisory:
8+
gem: mpxj
9+
cve: 2024-49771
10+
ghsa: j945-c44v-97g6
11+
url: https://github.com/joniles/mpxj/security/advisories/GHSA-j945-c44v-97g6
12+
title: MPXJ has a Potential Path Traversal Vulnerability
13+
date: 2024-10-28
14+
description: |
15+
### Impact
16+
17+
The patch for the historical vulnerability CVE-2020-35460 in MPXJ
18+
is incomplete as there is still a possibility that a malicious path
19+
could be constructed which would not be picked up by the original
20+
fix and allow files to be written to arbitrary locations.
21+
22+
### Patches
23+
24+
The issue is addressed in MPXJ version 13.5.1
25+
26+
### Workarounds
27+
28+
Do not pass zip files to MPXJ.
29+
30+
### References
31+
N/A
32+
cvss_v3: 5.3
33+
unaffected_versions:
34+
- "< 8.3.5"
35+
patched_versions:
36+
- ">= 13.5.1"
37+
related:
38+
url:
39+
- https://github.com/joniles/mpxj/security/advisories/GHSA-j945-c44v-97g6
40+
- https://github.com/joniles/mpxj/commit/8002802890dfdc8bc74259f37e053e15b827eea0
41+
- https://github.com/advisories/GHSA-j945-c44v-97g6
42+
---

0 commit comments

Comments
 (0)