2024-10-29 08:00:49 +00:00
{
"id" : "CVE-2024-49761" ,
"sourceIdentifier" : "security-advisories@github.com" ,
"published" : "2024-10-28T15:15:05.157" ,
2025-03-21 17:03:54 +00:00
"lastModified" : "2025-03-21T16:37:05.047" ,
"vulnStatus" : "Analyzed" ,
2024-10-29 08:00:49 +00:00
"cveTags" : [ ] ,
"descriptions" : [
{
"lang" : "en" ,
"value" : "REXML is an XML toolkit for Ruby. The REXML gem before 3.3.9 has a ReDoS vulnerability when it parses an XML that has many digits between &# and x...; in a hex numeric character reference (&#x...;). This does not happen with Ruby 3.2 or later. Ruby 3.1 is the only affected maintained Ruby. The REXML gem 3.3.9 or later include the patch to fix the vulnerability."
2024-10-29 15:03:51 +00:00
} ,
{
"lang" : "es" ,
"value" : "REXML es un conjunto de herramientas XML para Ruby. La gema REXML anterior a la versi\u00f3n 3.3.9 tiene una vulnerabilidad ReDoS cuando analiza un XML que tiene muchos d\u00edgitos entre &# y x...; en una referencia de car\u00e1cter num\u00e9rico hexadecimal (&#x...;). Esto no sucede con Ruby 3.2 o posterior. Ruby 3.1 es el \u00fanico Ruby afectado que se mantiene. La gema REXML 3.3.9 o posterior incluye el parche para corregir la vulnerabilidad."
2024-10-29 08:00:49 +00:00
}
] ,
"metrics" : {
"cvssMetricV40" : [
{
"source" : "security-advisories@github.com" ,
"type" : "Secondary" ,
"cvssData" : {
"version" : "4.0" ,
"vectorString" : "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" ,
2024-12-08 03:06:42 +00:00
"baseScore" : 6.6 ,
"baseSeverity" : "MEDIUM" ,
2024-10-29 08:00:49 +00:00
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"attackRequirements" : "NONE" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "NONE" ,
2025-03-02 03:03:52 +00:00
"vulnConfidentialityImpact" : "NONE" ,
"vulnIntegrityImpact" : "NONE" ,
"vulnAvailabilityImpact" : "HIGH" ,
"subConfidentialityImpact" : "NONE" ,
"subIntegrityImpact" : "NONE" ,
"subAvailabilityImpact" : "NONE" ,
2024-10-29 08:00:49 +00:00
"exploitMaturity" : "UNREPORTED" ,
2025-03-02 03:03:52 +00:00
"confidentialityRequirement" : "NOT_DEFINED" ,
"integrityRequirement" : "NOT_DEFINED" ,
"availabilityRequirement" : "NOT_DEFINED" ,
2024-10-29 08:00:49 +00:00
"modifiedAttackVector" : "NOT_DEFINED" ,
"modifiedAttackComplexity" : "NOT_DEFINED" ,
"modifiedAttackRequirements" : "NOT_DEFINED" ,
"modifiedPrivilegesRequired" : "NOT_DEFINED" ,
"modifiedUserInteraction" : "NOT_DEFINED" ,
2025-03-02 03:03:52 +00:00
"modifiedVulnConfidentialityImpact" : "NOT_DEFINED" ,
"modifiedVulnIntegrityImpact" : "NOT_DEFINED" ,
"modifiedVulnAvailabilityImpact" : "NOT_DEFINED" ,
"modifiedSubConfidentialityImpact" : "NOT_DEFINED" ,
"modifiedSubIntegrityImpact" : "NOT_DEFINED" ,
"modifiedSubAvailabilityImpact" : "NOT_DEFINED" ,
"Safety" : "NOT_DEFINED" ,
"Automatable" : "NOT_DEFINED" ,
"Recovery" : "NOT_DEFINED" ,
2024-10-29 08:00:49 +00:00
"valueDensity" : "NOT_DEFINED" ,
"vulnerabilityResponseEffort" : "NOT_DEFINED" ,
2024-12-08 03:06:42 +00:00
"providerUrgency" : "NOT_DEFINED"
2024-10-29 08:00:49 +00:00
}
}
2024-11-05 17:03:22 +00:00
] ,
"cvssMetricV31" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" ,
2024-12-08 03:06:42 +00:00
"baseScore" : 7.5 ,
"baseSeverity" : "HIGH" ,
2024-11-05 17:03:22 +00:00
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "NONE" ,
"integrityImpact" : "NONE" ,
2024-12-08 03:06:42 +00:00
"availabilityImpact" : "HIGH"
2024-11-05 17:03:22 +00:00
} ,
"exploitabilityScore" : 3.9 ,
"impactScore" : 3.6
}
2024-10-29 08:00:49 +00:00
]
} ,
"weaknesses" : [
{
"source" : "security-advisories@github.com" ,
2025-01-12 03:03:49 +00:00
"type" : "Primary" ,
2024-10-29 08:00:49 +00:00
"description" : [
{
"lang" : "en" ,
"value" : "CWE-1333"
}
]
}
] ,
2024-11-05 17:03:22 +00:00
"configurations" : [
{
2025-03-21 17:03:54 +00:00
"operator" : "AND" ,
2024-11-05 17:03:22 +00:00
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ruby-lang:rexml:*:*:*:*:*:ruby:*:*" ,
"versionEndExcluding" : "3.3.9" ,
"matchCriteriaId" : "326BEE19-C954-4EAA-8473-E76CCD43A48F"
}
]
2025-03-21 17:03:54 +00:00
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:a:ruby-lang:ruby:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "3.2.0" ,
"matchCriteriaId" : "F841AE5D-60DD-4E3A-854A-9B7B906BF7E7"
}
]
}
]
} ,
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:netapp:ontap_tools:10:*:*:*:*:vmware_vsphere:*:*" ,
"matchCriteriaId" : "5333B745-F7A3-46CB-8437-8668DB08CD6F"
}
]
2024-11-05 17:03:22 +00:00
}
]
}
] ,
2024-10-29 08:00:49 +00:00
"references" : [
{
"url" : "https://github.com/ruby/rexml/commit/ce59f2eb1aeb371fe1643414f06618dbe031979f" ,
2024-11-05 17:03:22 +00:00
"source" : "security-advisories@github.com" ,
"tags" : [
"Patch"
]
2024-10-29 08:00:49 +00:00
} ,
{
"url" : "https://github.com/ruby/rexml/security/advisories/GHSA-2rxp-v6pw-ch6m" ,
2024-11-05 17:03:22 +00:00
"source" : "security-advisories@github.com" ,
"tags" : [
"Third Party Advisory"
]
2024-10-29 08:00:49 +00:00
} ,
{
"url" : "https://www.ruby-lang.org/en/news/2024/10/28/redos-rexml-cve-2024-49761" ,
2024-11-05 17:03:22 +00:00
"source" : "security-advisories@github.com" ,
"tags" : [
"Vendor Advisory"
]
2024-12-27 17:03:43 +00:00
} ,
{
"url" : "https://security.netapp.com/advisory/ntap-20241227-0004/" ,
2025-03-21 17:03:54 +00:00
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Third Party Advisory"
]
2024-10-29 08:00:49 +00:00
}
]
}