REXML Gem Vulnerability: Untrusted XML Parsing May Cause Denial of Service

CVE-2024-35176

5.3MEDIUM

Key Information

Vendor
Ruby
Status
Rexml
Vendor
CVE Published:
16 May 2024

Badges

👾 Exploit Exists🔴 Public PoC

What is CVE-2024-35176?

CVE-2024-35176 is a vulnerability identified in the REXML gem, an XML parsing toolkit utilized within the Ruby programming language ecosystem. This vulnerability arises from improper handling of untrusted XML input, specifically when parsing documents containing numerous less-than symbols (<) in attribute values. If exploited, this vulnerability could potentially lead to denial of service (DoS) incidents, rendering applications utilizing REXML unresponsive, which could significantly disrupt business operations or services relying on XML processing.

Technical Details

The vulnerability affects versions of the REXML gem prior to 3.2.6. It occurs during the XML parsing process when handling untrusted XML content. Attackers can manipulate the XML input to overwhelm the parser by embedding a high concentration of < symbols within attribute values, leading to excessive resource consumption. This results in the application becoming unresponsive, creating challenges for organizations that depend on robust XML handling capabilities for their operations. To address this vulnerability, the REXML gem has released an updated version (3.2.7) that includes necessary security fixes.

Potential impact of CVE-2024-35176

  1. Denial of Service: The most immediate impact of this vulnerability is the potential for denial of service. Exploitation may cause servers to become unresponsive when handling crafted XML inputs, thus disrupting the availability of services dependent on REXML for XML data processing.

  2. Operational Disruption: Organizations using applications that involve XML parsing may experience operational disruptions, as affected systems could halt or slow down significantly due to resource exhaustion. This could hinder business processes that are critical for maintaining service levels.

  3. Increased Vulnerability Exposure: If organizations continue to utilize outdated versions of the REXML gem, they may become attractive targets for attackers. This vulnerability highlights the risks associated with not applying timely security patches, increasing the surface area for further attacks, such as potential data breaches or unauthorized access in a broader attack chain.

Affected Version(s)

rexml = < 3.2.7

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

Refferences

CVSS V3.1

Score:
5.3
Severity:
MEDIUM
Confidentiality:
None
Integrity:
None
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • 🔴

    Public PoC available

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Collectors

NVD DatabaseMitre Database1 Proof of Concept(s)
.