File tree Expand file tree Collapse file tree 2 files changed +89
-0
lines changed
Expand file tree Collapse file tree 2 files changed +89
-0
lines changed Original file line number Diff line number Diff line change 1+ ---
2+ layout : advisory
3+ title : ' CVE-2024-49761 (rexml): REXML ReDoS vulnerability'
4+ comments : false
5+ categories :
6+ - rexml
7+ advisory :
8+ gem : rexml
9+ cve : 2024-49761
10+ ghsa : 2rxp-v6pw-ch6m
11+ url : https://github.com/ruby/rexml/security/advisories/GHSA-2rxp-v6pw-ch6m
12+ title : REXML ReDoS vulnerability
13+ date : 2024-10-28
14+ description : |
15+ ## Impact
16+
17+ The REXML gem before 3.3.9 has a ReDoS vulnerability when it
18+ parses an XML that has many digits between `&#` and `x...;`
19+ in a hex numeric character reference (`&#x...;`).
20+
21+ This does not happen with Ruby 3.2 or later. Ruby 3.1 is the only
22+ affected maintained Ruby. Note that Ruby 3.1 will reach EOL on 2025-03.
23+
24+ ## Patches
25+
26+ The REXML gem 3.3.9 or later include the patch to fix the vulnerability.
27+
28+ ## Workarounds
29+
30+ Use Ruby 3.2 or later instead of Ruby 3.1.
31+
32+ ## References
33+
34+ * https://www.ruby-lang.org/en/news/2024/10/28/redos-rexml-cve-2024-49761
35+ * Announced on www.ruby-lang.org.
36+ cvss_v4 : 6.6
37+ patched_versions :
38+ - " >= 3.3.9"
39+ related :
40+ url :
41+ - https://nvd.nist.gov/vuln/detail/CVE-2024-49761
42+ - https://github.com/ruby/rexml/releases/tag/v3.3.9
43+ - https://github.com/ruby/rexml/security/advisories/GHSA-2rxp-v6pw-ch6m
44+ - https://github.com/ruby/rexml/commit/ce59f2eb1aeb371fe1643414f06618dbe031979f
45+ - https://www.ruby-lang.org/en/news/2024/10/28/redos-rexml-cve-2024-49761
46+ - https://github.com/advisories/GHSA-2rxp-v6pw-ch6m
47+ ---
Original file line number Diff line number Diff line change 1+ ---
2+ layout : advisory
3+ title : ' CVE-2024-49771 (mpxj): MPXJ has a Potential Path Traversal Vulnerability'
4+ comments : false
5+ categories :
6+ - mpxj
7+ advisory :
8+ gem : mpxj
9+ cve : 2024-49771
10+ ghsa : j945-c44v-97g6
11+ url : https://github.com/joniles/mpxj/security/advisories/GHSA-j945-c44v-97g6
12+ title : MPXJ has a Potential Path Traversal Vulnerability
13+ date : 2024-10-28
14+ description : |
15+ ### Impact
16+
17+ The patch for the historical vulnerability CVE-2020-35460 in MPXJ
18+ is incomplete as there is still a possibility that a malicious path
19+ could be constructed which would not be picked up by the original
20+ fix and allow files to be written to arbitrary locations.
21+
22+ ### Patches
23+
24+ The issue is addressed in MPXJ version 13.5.1
25+
26+ ### Workarounds
27+
28+ Do not pass zip files to MPXJ.
29+
30+ ### References
31+ N/A
32+ cvss_v3 : 5.3
33+ unaffected_versions :
34+ - " < 8.3.5"
35+ patched_versions :
36+ - " >= 13.5.1"
37+ related :
38+ url :
39+ - https://github.com/joniles/mpxj/security/advisories/GHSA-j945-c44v-97g6
40+ - https://github.com/joniles/mpxj/commit/8002802890dfdc8bc74259f37e053e15b827eea0
41+ - https://github.com/advisories/GHSA-j945-c44v-97g6
42+ ---
You can’t perform that action at this time.
0 commit comments