Vulnerability Details : CVE-2013-1821
lib/rexml/text.rb in the REXML parser in Ruby before 1.9.3-p392 allows remote attackers to cause a denial of service (memory consumption and crash) via crafted text nodes in an XML document, aka an XML Entity Expansion (XEE) attack.
Vulnerability category: Input validationDenial of service
Products affected by CVE-2013-1821
- cpe:2.3:a:ruby-lang:ruby:*:p385:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:1.9:*:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:1.9.1:*:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:2.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:1.9.2:*:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:1.9.3:*:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:2.0.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:2.0.0:rc2:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:2.0:*:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:1.9.3:p125:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:1.9.3:p194:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:1.9.3:p0:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:1.9.3:p286:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:1.9.3:p383:*:*:*:*:*:*
Threat overview for CVE-2013-1821
Top countries where our scanners detected CVE-2013-1821
Top open port discovered on systems with this issue
22
IPs affected by CVE-2013-1821 1,952
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2013-1821!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2013-1821
10.43%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 95 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2013-1821
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:N/A:P |
10.0
|
2.9
|
NIST |
CWE ids for CVE-2013-1821
-
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.Assigned by: nvd@nist.gov (Primary)
References for CVE-2013-1821
-
http://www.ruby-lang.org/en/news/2013/02/22/rexml-dos-2013-02-22/
Entity expansion DoS vulnerability in REXML (XML bomb, CVE-2013-1821)Vendor Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00015.html
[security-announce] SUSE-SU-2013:0647-1: important: Security update for
-
http://www.debian.org/security/2013/dsa-2738
Debian -- Security Information -- DSA-2738-1 ruby1.9.1
-
http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00001.html
[security-announce] SUSE-SU-2013:0609-1: important: Security update for
-
http://lists.opensuse.org/opensuse-updates/2013-04/msg00036.html
openSUSE-SU-2013:0614-1: ruby: update to fix XML security problems
-
https://bugzilla.redhat.com/show_bug.cgi?id=914716
914716 – (CVE-2013-1821) CVE-2013-1821 ruby: entity expansion DoS vulnerability in REXML
-
http://svn.ruby-lang.org/cgi-bin/viewvc.cgi?view=revision&revision=39384
[ruby] Revision 39384
-
http://www.debian.org/security/2013/dsa-2809
Debian -- Security Information -- DSA-2809-1 ruby1.8
-
http://www.openwall.com/lists/oss-security/2013/03/06/5
oss-security - CVE for Ruby Entity expansion DoS vulnerability in REXML (XML bomb)
-
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=702525
#702525 - ruby1.9.1: CVE-2013-1821: entity expansion DoS vulnerability in REXML - Debian Bug report logs
-
http://rhn.redhat.com/errata/RHSA-2013-1147.html
Red Hat Customer Portal
-
http://rhn.redhat.com/errata/RHSA-2013-0612.html
RHSA-2013:0612 - Security Advisory - Red Hat Customer Portal
-
http://www.ubuntu.com/usn/USN-1780-1
USN-1780-1: Ruby vulnerability | Ubuntu security notices
-
https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0092
Support/Advisories/MGASA-2013-0092 - Mageia wiki
-
http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html
Oracle Solaris Third Party Bulletin - July 2015
-
http://www.securityfocus.com/bid/58141
Ruby REXML Parser Denial of Service Vulnerability
-
http://www.mandriva.com/security/advisories?name=MDVSA-2013:124
mandriva.com
-
http://rhn.redhat.com/errata/RHSA-2013-0611.html
RHSA-2013:0611 - Security Advisory - Red Hat Customer Portal
-
http://rhn.redhat.com/errata/RHSA-2013-1028.html
RHSA-2013:1028 - Security Advisory - Red Hat Customer Portal
-
http://www.slackware.com/security/viewer.php?l=slackware-security&y=2013&m=slackware-security.426862
The Slackware Linux Project: Slackware Security Advisories
-
http://lists.opensuse.org/opensuse-updates/2013-04/msg00034.html
openSUSE-SU-2013:0603-1: moderate: ruby: update to fix XML and JSON secu
Jump to