CVE-2024-49761: REXML ReDoS vulnerability
7.5
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.6377%
CWE
Published
10/28/2024
Updated
12/27/2024
KEV Status
No
Technology
Ruby
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
rexml | rubygems | < 3.3.9 | 3.3.9 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from the CHARACTER_REFERENCES
regex pattern in baseparser.rb
, which originally contained '0*' allowing arbitrary leading zeros in hex character references (�...;). This created an inefficient regex that could be exploited for ReDoS. The unnormalize
method executes this regex via gsub!
, making it the entry point for processing malicious inputs. The commit patched both the regex pattern and the subsequent parsing logic, confirming this function
's role in the vulnerability.