Miggo Logo

CVE-2024-45490:
An issue was discovered in libexpat before 2.6.3. xmlparse.c does not reject a negative length...

9.8

CVSS Score
3.1

Basic Information

EPSS Score
0.22667%
Published
8/30/2024
Updated
3/14/2025
KEV Status
No
Technology
-

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability description explicitly mentions that xmlparse.c does not reject a negative length for XML_ParseBuffer. The provided commit 5c1a31642e243f4870c0bd1f2afc7597976521bf shows a direct modification to the XML_ParseBuffer function in expat/lib/xmlparse.c. The patch adds a condition to check if the len argument is negative and, if so, sets an error code and returns XML_STATUS_ERROR. This directly addresses the described vulnerability, confirming that XML_ParseBuffer was the function susceptible to the issue prior to this patch. The other commits are related to adding tests and documentation for this fix and do not indicate other vulnerable functions related to this specific CVE description about negative length in XML_ParseBuffer.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

*n issu* w*s *is*ov*r** in li**xp*t ***or* *.*.*. xmlp*rs*.* *o*s not r*j**t * n***tiv* l*n*t* *or XML_P*rs**u***r.

Reasoning

T** vuln*r**ility **s*ription *xpli*itly m*ntions t**t `xmlp*rs*.*` *o*s not r*j**t * n***tiv* l*n*t* *or `XML_P*rs**u***r`. T** provi*** *ommit `****************************************` s*ows * *ir**t mo*i*i**tion to t** `XML_P*rs**u***r` *un*tion