Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
N/A
Vulnerability Description
The REXML parser in Ruby 1.9.x before 1.9.3 patchlevel 551, 2.0.x before 2.0.0 patchlevel 598, and 2.1.x before 2.1.5 allows remote attackers to cause a denial of service (CPU and memory consumption) a crafted XML document containing an empty string in an entity that is used in a large number of nested entity references, aka an XML Entity Expansion (XEE) attack. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-1821 and CVE-2014-8080.
CVSS Information
N/A
Vulnerability Type
N/A
Vulnerability Title
Ruby REXML解析器拒绝服务漏洞
Vulnerability Description
REXML是一个基于Ruby语言的XML工具包,它主要用于对XML文件进行解析。 Ruby的REXML解析器中存在安全漏洞,该漏洞源于程序没有正确处理XML实体扩展。远程攻击者可借助特制的XML文档利用该漏洞造成拒绝服务(CPU和内存消耗)。以下版本受到影响:Ruby 1.9.3 patchlevel 551之前1.9.x版本,2.0.0 patchlevel 598之前2.0.x版本,2.1.5之前2.1.x版本。(说明:CVE-2013-1821和CVE-2014-8080的补丁没有完全修复该漏洞,在
CVSS Information
N/A
Vulnerability Type
N/A