CVE-2021-28965 - log back

CVE-2021-28965 edited at 14 Apr 2021 13:59:08
Severity
- Medium
+ Critical
CVE-2021-28965 edited at 08 Apr 2021 19:29:50
Severity
- Unknown
+ Medium
Remote
- Unknown
+ Remote
Type
- Unknown
+ Incorrect calculation
Description
+ When parsing and serializing a crafted XML document, the REXML gem (including the one bundled with Ruby) can create a wrong XML document whose structure is different from the original one. The impact of this issue highly depends on context, but it may lead to a vulnerability in some programs that are using REXML. The issue is fixed in version 3.2.5 of the REXML gem.
References
+ https://www.ruby-lang.org/en/news/2021/04/05/xml-round-trip-vulnerability-in-rexml-cve-2021-28965/
+ https://hackerone.com/reports/1104077
+ https://github.com/ruby/rexml/commit/a659c63e37414506dfb0d4655e031bb7a2e73fc8
+ https://github.com/ruby/rexml/commit/2fe62e29094d95921d7e19abbd2e26b23d78dc5b
+ https://github.com/ruby/rexml/commit/6a250d2cd1194c2be72becbdd9c3e770aa16e752
+ https://github.com/ruby/rexml/commit/f7bab8937513b1403cea5aff874cbf32fd5e8551
+ https://github.com/ruby/rexml/commit/f9d88e4948b4a43294c25dc0edb16815bd9d8618
+ https://github.com/ruby/rexml/commit/9b311e59ae05749e082eb6bbefa1cb620d1a786e
+ https://github.com/ruby/rexml/commit/3c137eb119550874b2b3e27d12b733ca67033377
Notes
CVE-2021-28965 created at 08 Apr 2021 19:23:35