<?xml version="1.0" encoding="utf-8"?>
<feed xml:lang="en-us" xmlns="http://www.w3.org/2005/Atom"><title>Simon Willison's Weblog: rexml</title><link href="http://simonwillison.net/" rel="alternate"/><link href="http://simonwillison.net/tags/rexml.atom" rel="self"/><id>http://simonwillison.net/</id><updated>2008-08-23T11:11:13+00:00</updated><author><name>Simon Willison</name></author><entry><title>DoS vulnerability in REXML</title><link href="https://simonwillison.net/2008/Aug/23/dos/#atom-tag" rel="alternate"/><published>2008-08-23T11:11:13+00:00</published><updated>2008-08-23T11:11:13+00:00</updated><id>https://simonwillison.net/2008/Aug/23/dos/#atom-tag</id><summary type="html">
    
&lt;p&gt;&lt;strong&gt;&lt;a href="http://www.ruby-lang.org/en/news/2008/08/23/dos-vulnerability-in-rexml/"&gt;DoS vulnerability in REXML&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
Ruby’s REXML library is susceptible to the “billion laughs” denial of service attack where recursively nested entities expand a single entitity reference to a billion characters (kind of like the exploding zip file attack). Rails applications that process user-supplied XML should apply the monkey-patch ASAP; a proper gem update is forthcoming.


    &lt;p&gt;Tags: &lt;a href="https://simonwillison.net/tags/billionlaughs"&gt;billionlaughs&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/denial-of-service"&gt;denial-of-service&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/rails"&gt;rails&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/rexml"&gt;rexml&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/ruby"&gt;ruby&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/security"&gt;security&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/xml"&gt;xml&lt;/a&gt;&lt;/p&gt;



</summary><category term="billionlaughs"/><category term="denial-of-service"/><category term="rails"/><category term="rexml"/><category term="ruby"/><category term="security"/><category term="xml"/></entry></feed>