5.3
MEDIUM
CVE-2024-35176
"REXML Denial of Service Vulnerability"
Description

REXML is an XML toolkit for Ruby. The REXML gem before 3.2.6 has a denial of service vulnerability when it parses an XML that has many `<`s in an attribute value. Those who need to parse untrusted XMLs may be impacted to this vulnerability. The REXML gem 3.2.7 or later include the patch to fix this vulnerability. As a workaround, don't parse untrusted XMLs.

INFO

Published Date :

May 16, 2024, 4:15 p.m.

Last Modified :

Nov. 21, 2024, 9:19 a.m.

Remotely Exploitable :

Yes !

Impact Score :

1.4

Exploitability Score :

3.9
Public PoC/Exploit Available at Github

CVE-2024-35176 has a 1 public PoC/Exploit available at Github. Go to the Public Exploits tab to see the list.

Affected Products

The following products are affected by CVE-2024-35176 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

ID Vendor Product Action
1 Ruby-lang rexml

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

CVE-2024-35176 poc full

Updated: 1 week, 6 days ago
5 stars 2 fork 2 watcher
Born at : Dec. 19, 2024, 7:01 p.m. This repo has been linked 1 different CVEs too.

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2024-35176 vulnerability anywhere in the article.

The following table lists the changes that have been made to the CVE-2024-35176 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • CVE Modified by af854a3a-2127-422b-91ae-364da2661108

    Nov. 21, 2024

    Action Type Old Value New Value
    Added Reference https://github.com/ruby/rexml/commit/4325835f92f3f142ebd91a3fdba4e1f1ab7f1cfb
    Added Reference https://github.com/ruby/rexml/security/advisories/GHSA-vg3r-rm7w-2xgh
    Added Reference https://www.ruby-lang.org/en/news/2024/05/16/dos-rexml-cve-2024-35176
  • CVE Received by [email protected]

    May. 16, 2024

    Action Type Old Value New Value
    Added Description REXML is an XML toolkit for Ruby. The REXML gem before 3.2.6 has a denial of service vulnerability when it parses an XML that has many `<`s in an attribute value. Those who need to parse untrusted XMLs may be impacted to this vulnerability. The REXML gem 3.2.7 or later include the patch to fix this vulnerability. As a workaround, don't parse untrusted XMLs.
    Added Reference GitHub, Inc. https://github.com/ruby/rexml/security/advisories/GHSA-vg3r-rm7w-2xgh [No types assigned]
    Added Reference GitHub, Inc. https://github.com/ruby/rexml/commit/4325835f92f3f142ebd91a3fdba4e1f1ab7f1cfb [No types assigned]
    Added Reference GitHub, Inc. https://www.ruby-lang.org/en/news/2024/05/16/dos-rexml-cve-2024-35176 [No types assigned]
    Added CWE GitHub, Inc. CWE-770
    Added CWE GitHub, Inc. CWE-400
    Added CVSS V3.1 GitHub, Inc. AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.
CWE - Common Weakness Enumeration

While CVE identifies specific instances of vulnerabilities, CWE categorizes the common flaws or weaknesses that can lead to vulnerabilities. CVE-2024-35176 is associated with the following CWEs:

CVSS31 - Vulnerability Scoring System
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability