The REXML module in Ruby 1.8.6 through 1.8.6-p287, 1.8.7 through 1.8.7-p72, and 1.9 allows context-dependent attackers to cause a denial of service (CPU consumption) via an XML document with recursively nested entities, aka an "XML entity explosion."
2008-08-27T20:41:00.000
2025-04-09T00:30:58.490
Deferred
CVSSv2: 5.0 (MEDIUM)
AV:N/AC:L/Au:N/C:N/I:N/A:P
10.0
2.9
| Type | Vendor | Product | Version/Range | Vulnerable? |
|---|---|---|---|---|
| Application | ruby-lang | ruby | 1.8.6 | Yes |
| Application | ruby-lang | ruby | 1.8.6 | Yes |
| Application | ruby-lang | ruby | 1.8.6 | Yes |
| Application | ruby-lang | ruby | 1.8.6 | Yes |
| Application | ruby-lang | ruby | 1.8.6 | Yes |
| Application | ruby-lang | ruby | 1.8.6 | Yes |
| Application | ruby-lang | ruby | 1.8.6 | Yes |
| Application | ruby-lang | ruby | 1.8.6 | Yes |
| Application | ruby-lang | ruby | 1.8.6 | Yes |
| Application | ruby-lang | ruby | 1.8.6 | Yes |
| Application | ruby-lang | ruby | 1.8.6 | Yes |
| Application | ruby-lang | ruby | 1.8.7 | Yes |
| Application | ruby-lang | ruby | 1.8.7 | Yes |
| Application | ruby-lang | ruby | 1.8.7 | Yes |
| Application | ruby-lang | ruby | 1.8.7 | Yes |
| Application | ruby-lang | ruby | 1.8.7 | Yes |
| Application | ruby-lang | ruby | 1.8.7 | Yes |
| Application | ruby-lang | ruby | 1.8.7 | Yes |
| Application | ruby-lang | ruby | 1.8.7 | Yes |
| Application | ruby-lang | ruby | 1.8.7 | Yes |
| Application | ruby-lang | ruby | 1.9 | Yes |