lib/rexml/text.rb in the REXML parser in Ruby before 1.9.3-p392 allows remote attackers to cause a denial of service (memory consumption and crash) via crafted text nodes in an XML document, aka an XML Entity Expansion (XEE) attack.
Date Added | Due Date | Vulnerability Name | Required Action |
---|---|---|---|
N/A |
Type | Version | Base score | Base severity | Vector |
---|---|---|---|---|
Primary | 2.0 | 5.0 | MEDIUM | AV:N/AC:L/Au:N/C:N/I:N/A:P |
CWE ID | Type | Source |
---|---|---|
CWE-20 | Primary | nvd@nist.gov |
Per: http://www.ruby-lang.org/en/news/2013/02/22/rexml-dos-2013-02-22/ "Affected versions All ruby 1.9 versions prior to ruby 1.9.3 patchlevel 392 All ruby 2.0 versions prior to ruby 2.0.0 patchlevel 0 prior to trunk revision 39384"