File tree 2 files changed +89
-0
lines changed
2 files changed +89
-0
lines changed Original file line number Diff line number Diff line change
1
+ ---
2
+ layout : advisory
3
+ title : ' CVE-2024-49761 (rexml): REXML ReDoS vulnerability'
4
+ comments : false
5
+ categories :
6
+ - rexml
7
+ advisory :
8
+ gem : rexml
9
+ cve : 2024-49761
10
+ ghsa : 2rxp-v6pw-ch6m
11
+ url : https://github.com/ruby/rexml/security/advisories/GHSA-2rxp-v6pw-ch6m
12
+ title : REXML ReDoS vulnerability
13
+ date : 2024-10-28
14
+ description : |
15
+ ## Impact
16
+
17
+ The REXML gem before 3.3.9 has a ReDoS vulnerability when it
18
+ parses an XML that has many digits between `&#` and `x...;`
19
+ in a hex numeric character reference (`&#x...;`).
20
+
21
+ This does not happen with Ruby 3.2 or later. Ruby 3.1 is the only
22
+ affected maintained Ruby. Note that Ruby 3.1 will reach EOL on 2025-03.
23
+
24
+ ## Patches
25
+
26
+ The REXML gem 3.3.9 or later include the patch to fix the vulnerability.
27
+
28
+ ## Workarounds
29
+
30
+ Use Ruby 3.2 or later instead of Ruby 3.1.
31
+
32
+ ## References
33
+
34
+ * https://www.ruby-lang.org/en/news/2024/10/28/redos-rexml-cve-2024-49761
35
+ * Announced on www.ruby-lang.org.
36
+ cvss_v4 : 6.6
37
+ patched_versions :
38
+ - " >= 3.3.9"
39
+ related :
40
+ url :
41
+ - https://nvd.nist.gov/vuln/detail/CVE-2024-49761
42
+ - https://github.com/ruby/rexml/releases/tag/v3.3.9
43
+ - https://github.com/ruby/rexml/security/advisories/GHSA-2rxp-v6pw-ch6m
44
+ - https://github.com/ruby/rexml/commit/ce59f2eb1aeb371fe1643414f06618dbe031979f
45
+ - https://www.ruby-lang.org/en/news/2024/10/28/redos-rexml-cve-2024-49761
46
+ - https://github.com/advisories/GHSA-2rxp-v6pw-ch6m
47
+ ---
Original file line number Diff line number Diff line change
1
+ ---
2
+ layout : advisory
3
+ title : ' CVE-2024-49771 (mpxj): MPXJ has a Potential Path Traversal Vulnerability'
4
+ comments : false
5
+ categories :
6
+ - mpxj
7
+ advisory :
8
+ gem : mpxj
9
+ cve : 2024-49771
10
+ ghsa : j945-c44v-97g6
11
+ url : https://github.com/joniles/mpxj/security/advisories/GHSA-j945-c44v-97g6
12
+ title : MPXJ has a Potential Path Traversal Vulnerability
13
+ date : 2024-10-28
14
+ description : |
15
+ ### Impact
16
+
17
+ The patch for the historical vulnerability CVE-2020-35460 in MPXJ
18
+ is incomplete as there is still a possibility that a malicious path
19
+ could be constructed which would not be picked up by the original
20
+ fix and allow files to be written to arbitrary locations.
21
+
22
+ ### Patches
23
+
24
+ The issue is addressed in MPXJ version 13.5.1
25
+
26
+ ### Workarounds
27
+
28
+ Do not pass zip files to MPXJ.
29
+
30
+ ### References
31
+ N/A
32
+ cvss_v3 : 5.3
33
+ unaffected_versions :
34
+ - " < 8.3.5"
35
+ patched_versions :
36
+ - " >= 13.5.1"
37
+ related :
38
+ url :
39
+ - https://github.com/joniles/mpxj/security/advisories/GHSA-j945-c44v-97g6
40
+ - https://github.com/joniles/mpxj/commit/8002802890dfdc8bc74259f37e053e15b827eea0
41
+ - https://github.com/advisories/GHSA-j945-c44v-97g6
42
+ ---
You can’t perform that action at this time.
0 commit comments