@fabasoad/sarif-to-slack 0.2.4 → 1.0.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (193) hide show
  1. package/.github/workflows/release.yml +1 -1
  2. package/.github/workflows/security.yml +0 -1
  3. package/.github/workflows/send-sarif-to-slack.yml +148 -76
  4. package/.gitleaksignore +8 -0
  5. package/.pre-commit-config.yaml +3 -3
  6. package/.tool-versions +1 -1
  7. package/dist/Logger.js +4 -1
  8. package/dist/SarifToSlackClient.d.ts +33 -0
  9. package/dist/SarifToSlackClient.d.ts.map +1 -0
  10. package/dist/SarifToSlackClient.js +178 -0
  11. package/dist/SlackMessageBuilder.js +34 -82
  12. package/dist/System.d.ts +2 -0
  13. package/dist/System.d.ts.map +1 -0
  14. package/dist/System.js +15 -0
  15. package/dist/index.cjs +843 -467
  16. package/dist/index.d.ts +35 -12
  17. package/dist/index.d.ts.map +1 -1
  18. package/dist/index.js +36 -12
  19. package/dist/model/Color.d.ts +70 -0
  20. package/dist/model/Color.d.ts.map +1 -0
  21. package/dist/model/Color.js +119 -0
  22. package/dist/model/Finding.d.ts +2 -0
  23. package/dist/model/Finding.d.ts.map +1 -0
  24. package/dist/model/Finding.js +93 -0
  25. package/dist/model/FindingsArray.d.ts +2 -0
  26. package/dist/model/FindingsArray.d.ts.map +1 -0
  27. package/dist/model/FindingsArray.js +24 -0
  28. package/dist/processors/CodeQLProcessor.d.ts +2 -0
  29. package/dist/processors/CodeQLProcessor.d.ts.map +1 -0
  30. package/dist/processors/CodeQLProcessor.js +17 -0
  31. package/dist/processors/CommonProcessor.d.ts +2 -0
  32. package/dist/processors/CommonProcessor.d.ts.map +1 -0
  33. package/dist/processors/CommonProcessor.js +84 -0
  34. package/dist/processors/ProcessorFactory.d.ts +2 -0
  35. package/dist/processors/ProcessorFactory.d.ts.map +1 -0
  36. package/dist/processors/ProcessorFactory.js +22 -0
  37. package/dist/processors/SnykProcessor.d.ts +2 -0
  38. package/dist/processors/SnykProcessor.d.ts.map +1 -0
  39. package/dist/processors/SnykProcessor.js +18 -0
  40. package/dist/representations/CompactGroupByRepresentation.d.ts +2 -0
  41. package/dist/representations/CompactGroupByRepresentation.d.ts.map +1 -0
  42. package/dist/representations/CompactGroupByRepresentation.js +58 -0
  43. package/dist/representations/CompactGroupByRunPerLevelRepresentation.d.ts +2 -0
  44. package/dist/representations/CompactGroupByRunPerLevelRepresentation.d.ts.map +1 -0
  45. package/dist/representations/CompactGroupByRunPerLevelRepresentation.js +13 -0
  46. package/dist/representations/CompactGroupByRunPerSeverityRepresentation.d.ts +2 -0
  47. package/dist/representations/CompactGroupByRunPerSeverityRepresentation.d.ts.map +1 -0
  48. package/dist/representations/CompactGroupByRunPerSeverityRepresentation.js +13 -0
  49. package/dist/representations/CompactGroupByRunRepresentation.d.ts +2 -0
  50. package/dist/representations/CompactGroupByRunRepresentation.d.ts.map +1 -0
  51. package/dist/representations/CompactGroupByRunRepresentation.js +39 -0
  52. package/dist/representations/CompactGroupBySarifPerLevelRepresentation.d.ts +2 -0
  53. package/dist/representations/CompactGroupBySarifPerLevelRepresentation.d.ts.map +1 -0
  54. package/dist/representations/CompactGroupBySarifPerLevelRepresentation.js +13 -0
  55. package/dist/representations/CompactGroupBySarifPerSeverityRepresentation.d.ts +2 -0
  56. package/dist/representations/CompactGroupBySarifPerSeverityRepresentation.d.ts.map +1 -0
  57. package/dist/representations/CompactGroupBySarifPerSeverityRepresentation.js +13 -0
  58. package/dist/representations/CompactGroupBySarifRepresentation.d.ts +2 -0
  59. package/dist/representations/CompactGroupBySarifRepresentation.d.ts.map +1 -0
  60. package/dist/representations/CompactGroupBySarifRepresentation.js +40 -0
  61. package/dist/representations/CompactGroupByToolNamePerLevelRepresentation.d.ts +2 -0
  62. package/dist/representations/CompactGroupByToolNamePerLevelRepresentation.d.ts.map +1 -0
  63. package/dist/representations/CompactGroupByToolNamePerLevelRepresentation.js +13 -0
  64. package/dist/representations/CompactGroupByToolNamePerSeverityRepresentation.d.ts +2 -0
  65. package/dist/representations/CompactGroupByToolNamePerSeverityRepresentation.d.ts.map +1 -0
  66. package/dist/representations/CompactGroupByToolNamePerSeverityRepresentation.js +13 -0
  67. package/dist/representations/CompactGroupByToolNameRepresentation.d.ts +2 -0
  68. package/dist/representations/CompactGroupByToolNameRepresentation.d.ts.map +1 -0
  69. package/dist/representations/CompactGroupByToolNameRepresentation.js +39 -0
  70. package/dist/representations/CompactTotalPerLevelRepresentation.d.ts +2 -0
  71. package/dist/representations/CompactTotalPerLevelRepresentation.d.ts.map +1 -0
  72. package/dist/representations/CompactTotalPerLevelRepresentation.js +13 -0
  73. package/dist/representations/CompactTotalPerSeverityRepresentation.d.ts +2 -0
  74. package/dist/representations/CompactTotalPerSeverityRepresentation.d.ts.map +1 -0
  75. package/dist/representations/CompactTotalPerSeverityRepresentation.js +13 -0
  76. package/dist/representations/CompactTotalRepresentation.d.ts +2 -0
  77. package/dist/representations/CompactTotalRepresentation.d.ts.map +1 -0
  78. package/dist/representations/CompactTotalRepresentation.js +25 -0
  79. package/dist/representations/Representation.d.ts +2 -0
  80. package/dist/representations/Representation.d.ts.map +1 -0
  81. package/dist/representations/Representation.js +28 -0
  82. package/dist/representations/RepresentationFactory.d.ts +2 -0
  83. package/dist/representations/RepresentationFactory.d.ts.map +1 -0
  84. package/dist/representations/RepresentationFactory.js +37 -0
  85. package/dist/sarif-to-slack.d.ts +337 -85
  86. package/dist/tsdoc-metadata.json +1 -1
  87. package/dist/types.d.ts +215 -51
  88. package/dist/types.d.ts.map +1 -1
  89. package/dist/types.js +225 -33
  90. package/dist/utils/Comparators.d.ts +2 -0
  91. package/dist/utils/Comparators.d.ts.map +1 -0
  92. package/dist/utils/Comparators.js +18 -0
  93. package/dist/utils/ExtendedArray.d.ts +2 -0
  94. package/dist/utils/ExtendedArray.d.ts.map +1 -0
  95. package/dist/utils/ExtendedArray.js +11 -0
  96. package/dist/utils/FileUtils.d.ts +2 -0
  97. package/dist/utils/FileUtils.d.ts.map +1 -0
  98. package/dist/utils/FileUtils.js +51 -0
  99. package/dist/utils/SarifUtils.js +19 -53
  100. package/etc/sarif-to-slack.api.md +161 -99
  101. package/jest.config.json +2 -2
  102. package/package.json +9 -9
  103. package/scripts/save-metadata.sh +15 -0
  104. package/src/Logger.ts +4 -0
  105. package/src/SarifToSlackClient.ts +202 -0
  106. package/src/SlackMessageBuilder.ts +35 -115
  107. package/src/System.ts +16 -0
  108. package/src/index.ts +47 -20
  109. package/src/model/Color.ts +201 -0
  110. package/src/model/Finding.ts +137 -0
  111. package/src/model/FindingsArray.ts +27 -0
  112. package/src/processors/CodeQLProcessor.ts +19 -0
  113. package/src/processors/CommonProcessor.ts +103 -0
  114. package/src/processors/ProcessorFactory.ts +23 -0
  115. package/src/processors/SnykProcessor.ts +19 -0
  116. package/src/representations/CompactGroupByRepresentation.ts +67 -0
  117. package/src/representations/CompactGroupByRunPerLevelRepresentation.ts +14 -0
  118. package/src/representations/CompactGroupByRunPerSeverityRepresentation.ts +14 -0
  119. package/src/representations/CompactGroupByRunRepresentation.ts +44 -0
  120. package/src/representations/CompactGroupBySarifPerLevelRepresentation.ts +15 -0
  121. package/src/representations/CompactGroupBySarifPerSeverityRepresentation.ts +15 -0
  122. package/src/representations/CompactGroupBySarifRepresentation.ts +45 -0
  123. package/src/representations/CompactGroupByToolNamePerLevelRepresentation.ts +15 -0
  124. package/src/representations/CompactGroupByToolNamePerSeverityRepresentation.ts +15 -0
  125. package/src/representations/CompactGroupByToolNameRepresentation.ts +44 -0
  126. package/src/representations/CompactTotalPerLevelRepresentation.ts +14 -0
  127. package/src/representations/CompactTotalPerSeverityRepresentation.ts +14 -0
  128. package/src/representations/CompactTotalRepresentation.ts +27 -0
  129. package/src/representations/Representation.ts +35 -0
  130. package/src/representations/RepresentationFactory.ts +49 -0
  131. package/src/types.ts +270 -53
  132. package/src/utils/Comparators.ts +19 -0
  133. package/src/utils/ExtendedArray.ts +11 -0
  134. package/src/utils/FileUtils.ts +60 -0
  135. package/src/utils/SarifUtils.ts +19 -71
  136. package/test-data/sarif/codeql-python.sarif +1448 -1
  137. package/test-data/sarif/codeql-typescript.sarif +3474 -1
  138. package/test-data/sarif/grype-github-actions.sarif +65 -0
  139. package/test-data/sarif/osv-scanner-composer.sarif +972 -0
  140. package/test-data/sarif/osv-scanner-container.sarif +2278 -0
  141. package/test-data/sarif/osv-scanner-gomodules.sarif +813 -0
  142. package/test-data/sarif/osv-scanner-hex.sarif +147 -0
  143. package/test-data/sarif/osv-scanner-maven.sarif +171 -0
  144. package/test-data/sarif/osv-scanner-npm.sarif +627 -0
  145. package/test-data/sarif/osv-scanner-pip.sarif +206 -0
  146. package/test-data/sarif/osv-scanner-pipenv.sarif +243 -0
  147. package/test-data/sarif/osv-scanner-pnpm.sarif +174 -0
  148. package/test-data/sarif/osv-scanner-poetry.sarif +1893 -0
  149. package/test-data/sarif/osv-scanner-rubygems.sarif +402 -0
  150. package/test-data/sarif/osv-scanner-uv.sarif +206 -0
  151. package/test-data/sarif/osv-scanner-yarn.sarif +5207 -0
  152. package/test-data/sarif/runs-0.sarif +5 -0
  153. package/test-data/sarif/runs-2-tools-2-results-0.sarif +1 -1
  154. package/test-data/sarif/runs-2-tools-2.sarif +1 -1
  155. package/test-data/sarif/runs-3-tools-2-results-0.sarif +1 -1
  156. package/test-data/sarif/runs-3-tools-2.sarif +1 -1
  157. package/test-data/sarif/tmp/codeql-csharp.sarif +1 -0
  158. package/test-data/sarif/tmp/grype-container.sarif +1774 -0
  159. package/test-data/sarif/tmp/runs-1-tools-1-results-0.sarif +18 -0
  160. package/test-data/sarif/tmp/runs-2-tools-2.sarif +686 -0
  161. package/test-data/sarif/trivy-iac.sarif +1 -1
  162. package/tests/integration/SendSarifToSlack.spec.ts +95 -27
  163. package/tsconfig.json +2 -0
  164. package/dist/Processors.d.ts +0 -2
  165. package/dist/Processors.d.ts.map +0 -1
  166. package/dist/Processors.js +0 -61
  167. package/dist/SarifToSlackService.d.ts +0 -39
  168. package/dist/SarifToSlackService.d.ts.map +0 -1
  169. package/dist/SarifToSlackService.js +0 -102
  170. package/dist/model/SarifModelPerRun.d.ts +0 -2
  171. package/dist/model/SarifModelPerRun.d.ts.map +0 -1
  172. package/dist/model/SarifModelPerRun.js +0 -90
  173. package/dist/model/SarifModelPerSarif.d.ts +0 -2
  174. package/dist/model/SarifModelPerSarif.d.ts.map +0 -1
  175. package/dist/model/SarifModelPerSarif.js +0 -102
  176. package/dist/model/types.d.ts +0 -2
  177. package/dist/model/types.d.ts.map +0 -1
  178. package/dist/model/types.js +0 -49
  179. package/dist/utils/SortUtils.d.ts +0 -2
  180. package/dist/utils/SortUtils.d.ts.map +0 -1
  181. package/dist/utils/SortUtils.js +0 -20
  182. package/dist/version.d.ts +0 -2
  183. package/dist/version.d.ts.map +0 -1
  184. package/dist/version.js +0 -11
  185. package/scripts/save-version.sh +0 -13
  186. package/src/Processors.ts +0 -68
  187. package/src/SarifToSlackService.ts +0 -115
  188. package/src/model/SarifModelPerRun.ts +0 -123
  189. package/src/model/SarifModelPerSarif.ts +0 -126
  190. package/src/model/types.ts +0 -50
  191. package/src/utils/SortUtils.ts +0 -33
  192. package/src/version.ts +0 -10
  193. package/tests/Processors.spec.ts +0 -76
@@ -0,0 +1,402 @@
1
+ {
2
+ "$schema": "https://raw.githubusercontent.com/oasis-tcs/sarif-spec/main/sarif-2.1/schema/sarif-schema-2.1.0.json",
3
+ "version": "2.1.0",
4
+ "runs": [
5
+ {
6
+ "addresses": [],
7
+ "artifacts": [
8
+ {
9
+ "length": -1,
10
+ "location": {
11
+ "index": -1,
12
+ "uri": "file:///Users/john.doe/projects/ruby/rubygems/Gemfile.lock"
13
+ },
14
+ "parentIndex": -1,
15
+ "roles": []
16
+ }
17
+ ],
18
+ "graphs": [],
19
+ "invocations": [],
20
+ "language": "en-US",
21
+ "logicalLocations": [],
22
+ "newlineSequences": [
23
+ "\r\n",
24
+ "\n"
25
+ ],
26
+ "policies": [],
27
+ "redactionTokens": [],
28
+ "results": [
29
+ {
30
+ "attachments": [],
31
+ "codeFlows": [],
32
+ "fixes": [],
33
+ "graphTraversals": [],
34
+ "graphs": [],
35
+ "kind": "fail",
36
+ "level": "warning",
37
+ "locations": [
38
+ {
39
+ "annotations": [],
40
+ "id": -1,
41
+ "logicalLocations": [],
42
+ "physicalLocation": {
43
+ "artifactLocation": {
44
+ "index": -1,
45
+ "uri": "file:///Users/john.doe/projects/ruby/rubygems/Gemfile.lock"
46
+ }
47
+ },
48
+ "relationships": []
49
+ }
50
+ ],
51
+ "message": {
52
+ "arguments": [],
53
+ "text": "Package 'rexml@3.2.6' is vulnerable to 'CVE-2024-49761' (also known as 'GHSA-2rxp-v6pw-ch6m')."
54
+ },
55
+ "rank": -1,
56
+ "relatedLocations": [],
57
+ "ruleId": "CVE-2024-49761",
58
+ "ruleIndex": 0,
59
+ "stacks": [],
60
+ "taxa": []
61
+ },
62
+ {
63
+ "attachments": [],
64
+ "codeFlows": [],
65
+ "fixes": [],
66
+ "graphTraversals": [],
67
+ "graphs": [],
68
+ "kind": "fail",
69
+ "level": "warning",
70
+ "locations": [
71
+ {
72
+ "annotations": [],
73
+ "id": -1,
74
+ "logicalLocations": [],
75
+ "physicalLocation": {
76
+ "artifactLocation": {
77
+ "index": -1,
78
+ "uri": "file:///Users/john.doe/projects/ruby/rubygems/Gemfile.lock"
79
+ }
80
+ },
81
+ "relationships": []
82
+ }
83
+ ],
84
+ "message": {
85
+ "arguments": [],
86
+ "text": "Package 'rexml@3.2.6' is vulnerable to 'CVE-2024-39908' (also known as 'GHSA-4xqq-m2hx-25v8')."
87
+ },
88
+ "rank": -1,
89
+ "relatedLocations": [],
90
+ "ruleId": "CVE-2024-39908",
91
+ "ruleIndex": 1,
92
+ "stacks": [],
93
+ "taxa": []
94
+ },
95
+ {
96
+ "attachments": [],
97
+ "codeFlows": [],
98
+ "fixes": [],
99
+ "graphTraversals": [],
100
+ "graphs": [],
101
+ "kind": "fail",
102
+ "level": "warning",
103
+ "locations": [
104
+ {
105
+ "annotations": [],
106
+ "id": -1,
107
+ "logicalLocations": [],
108
+ "physicalLocation": {
109
+ "artifactLocation": {
110
+ "index": -1,
111
+ "uri": "file:///Users/john.doe/projects/ruby/rubygems/Gemfile.lock"
112
+ }
113
+ },
114
+ "relationships": []
115
+ }
116
+ ],
117
+ "message": {
118
+ "arguments": [],
119
+ "text": "Package 'rexml@3.2.6' is vulnerable to 'CVE-2024-41946' (also known as 'GHSA-5866-49gr-22v4')."
120
+ },
121
+ "rank": -1,
122
+ "relatedLocations": [],
123
+ "ruleId": "CVE-2024-41946",
124
+ "ruleIndex": 2,
125
+ "stacks": [],
126
+ "taxa": []
127
+ },
128
+ {
129
+ "attachments": [],
130
+ "codeFlows": [],
131
+ "fixes": [],
132
+ "graphTraversals": [],
133
+ "graphs": [],
134
+ "kind": "fail",
135
+ "level": "warning",
136
+ "locations": [
137
+ {
138
+ "annotations": [],
139
+ "id": -1,
140
+ "logicalLocations": [],
141
+ "physicalLocation": {
142
+ "artifactLocation": {
143
+ "index": -1,
144
+ "uri": "file:///Users/john.doe/projects/ruby/rubygems/Gemfile.lock"
145
+ }
146
+ },
147
+ "relationships": []
148
+ }
149
+ ],
150
+ "message": {
151
+ "arguments": [],
152
+ "text": "Package 'rexml@3.2.6' is vulnerable to 'CVE-2024-41123' (also known as 'GHSA-r55c-59qm-vjw6')."
153
+ },
154
+ "rank": -1,
155
+ "relatedLocations": [],
156
+ "ruleId": "CVE-2024-41123",
157
+ "ruleIndex": 3,
158
+ "stacks": [],
159
+ "taxa": []
160
+ },
161
+ {
162
+ "attachments": [],
163
+ "codeFlows": [],
164
+ "fixes": [],
165
+ "graphTraversals": [],
166
+ "graphs": [],
167
+ "kind": "fail",
168
+ "level": "warning",
169
+ "locations": [
170
+ {
171
+ "annotations": [],
172
+ "id": -1,
173
+ "logicalLocations": [],
174
+ "physicalLocation": {
175
+ "artifactLocation": {
176
+ "index": -1,
177
+ "uri": "file:///Users/john.doe/projects/ruby/rubygems/Gemfile.lock"
178
+ }
179
+ },
180
+ "relationships": []
181
+ }
182
+ ],
183
+ "message": {
184
+ "arguments": [],
185
+ "text": "Package 'rexml@3.2.6' is vulnerable to 'CVE-2024-35176' (also known as 'GHSA-vg3r-rm7w-2xgh')."
186
+ },
187
+ "rank": -1,
188
+ "relatedLocations": [],
189
+ "ruleId": "CVE-2024-35176",
190
+ "ruleIndex": 4,
191
+ "stacks": [],
192
+ "taxa": []
193
+ },
194
+ {
195
+ "attachments": [],
196
+ "codeFlows": [],
197
+ "fixes": [],
198
+ "graphTraversals": [],
199
+ "graphs": [],
200
+ "kind": "fail",
201
+ "level": "warning",
202
+ "locations": [
203
+ {
204
+ "annotations": [],
205
+ "id": -1,
206
+ "logicalLocations": [],
207
+ "physicalLocation": {
208
+ "artifactLocation": {
209
+ "index": -1,
210
+ "uri": "file:///Users/john.doe/projects/ruby/rubygems/Gemfile.lock"
211
+ }
212
+ },
213
+ "relationships": []
214
+ }
215
+ ],
216
+ "message": {
217
+ "arguments": [],
218
+ "text": "Package 'rexml@3.2.6' is vulnerable to 'CVE-2024-43398' (also known as 'GHSA-vmwr-mc7x-5vc3')."
219
+ },
220
+ "rank": -1,
221
+ "relatedLocations": [],
222
+ "ruleId": "CVE-2024-43398",
223
+ "ruleIndex": 5,
224
+ "stacks": [],
225
+ "taxa": []
226
+ }
227
+ ],
228
+ "runAggregates": [],
229
+ "taxonomies": [],
230
+ "threadFlowLocations": [],
231
+ "tool": {
232
+ "driver": {
233
+ "contents": [
234
+ "localizedData",
235
+ "nonLocalizedData"
236
+ ],
237
+ "informationUri": "https://github.com/google/osv-scanner",
238
+ "isComprehensive": false,
239
+ "language": "en-US",
240
+ "locations": [],
241
+ "name": "osv-scanner",
242
+ "notifications": [],
243
+ "rules": [
244
+ {
245
+ "deprecatedIds": [
246
+ "CVE-2024-49761",
247
+ "GHSA-2rxp-v6pw-ch6m"
248
+ ],
249
+ "fullDescription": {
250
+ "markdown": "### Impact\n\nThe REXML gem before 3.3.9 has a ReDoS vulnerability when it parses an XML that has many digits between `\u0026#` and `x...;` in a hex numeric character reference (`\u0026#x...;`).\n\nThis does not happen with Ruby 3.2 or later. Ruby 3.1 is the only affected maintained Ruby. Note that Ruby 3.1 will reach EOL on 2025-03.\n\n### Patches\n\nThe REXML gem 3.3.9 or later include the patch to fix the vulnerability.\n\n### Workarounds\n\nUse Ruby 3.2 or later instead of Ruby 3.1.\n\n### References\n\n* https://www.ruby-lang.org/en/news/2024/10/28/redos-rexml-cve-2024-49761/: An announce on www.ruby-lang.org\n",
251
+ "text": "### Impact\n\nThe REXML gem before 3.3.9 has a ReDoS vulnerability when it parses an XML that has many digits between `\u0026#` and `x...;` in a hex numeric character reference (`\u0026#x...;`).\n\nThis does not happen with Ruby 3.2 or later. Ruby 3.1 is the only affected maintained Ruby. Note that Ruby 3.1 will reach EOL on 2025-03.\n\n### Patches\n\nThe REXML gem 3.3.9 or later include the patch to fix the vulnerability.\n\n### Workarounds\n\nUse Ruby 3.2 or later instead of Ruby 3.1.\n\n### References\n\n* https://www.ruby-lang.org/en/news/2024/10/28/redos-rexml-cve-2024-49761/: An announce on www.ruby-lang.org\n"
252
+ },
253
+ "help": {
254
+ "markdown": "**Your dependency is vulnerable to [CVE-2024-49761](https://osv.dev/CVE-2024-49761)**.\n\n## [GHSA-2rxp-v6pw-ch6m](https://osv.dev/GHSA-2rxp-v6pw-ch6m)\n\n\u003cdetails\u003e\n\u003csummary\u003eDetails\u003c/summary\u003e\n\n\u003e ### Impact\n\u003e \n\u003e The REXML gem before 3.3.9 has a ReDoS vulnerability when it parses an XML that has many digits between `\u0026#` and `x...;` in a hex numeric character reference (`\u0026#x...;`).\n\u003e \n\u003e This does not happen with Ruby 3.2 or later. Ruby 3.1 is the only affected maintained Ruby. Note that Ruby 3.1 will reach EOL on 2025-03.\n\u003e \n\u003e ### Patches\n\u003e \n\u003e The REXML gem 3.3.9 or later include the patch to fix the vulnerability.\n\u003e \n\u003e ### Workarounds\n\u003e \n\u003e Use Ruby 3.2 or later instead of Ruby 3.1.\n\u003e \n\u003e ### References\n\u003e \n\u003e * https://www.ruby-lang.org/en/news/2024/10/28/redos-rexml-cve-2024-49761/: An announce on www.ruby-lang.org\n\u003e \n\n\u003c/details\u003e\n\n---\n\n### Affected Packages\n\n| Source | Package Name | Package Version |\n| --- | --- | --- |\n| lockfile:/Users/john.doe/projects/ruby/rubygems/Gemfile.lock | rexml | 3.2.6 |\n\n## Remediation\n\nTo fix these vulnerabilities, update the vulnerabilities past the listed fixed versions below.\n\n### Fixed Versions\n\n| Vulnerability ID | Package Name | Fixed Version |\n| --- | --- | --- |\n| GHSA-2rxp-v6pw-ch6m | rexml | 3.3.9 |\n\nIf you believe these vulnerabilities do not affect your code and wish to ignore them, add them to the ignore list in an\n`osv-scanner.toml` file located in the same directory as the lockfile containing the vulnerable dependency.\n\nSee the format and more options in our documentation here: https://google.github.io/osv-scanner/configuration/\n\nAdd or append these values to the following config files to ignore this vulnerability:\n\n`/Users/john.doe/projects/ruby/rubygems/osv-scanner.toml`\n\n```\n[[IgnoredVulns]]\nid = \"CVE-2024-49761\"\nreason = \"Your reason for ignoring this vulnerability\"\n```\n",
255
+ "text": "**Your dependency is vulnerable to [CVE-2024-49761](https://osv.dev/CVE-2024-49761)**.\n\n## [GHSA-2rxp-v6pw-ch6m](https://osv.dev/GHSA-2rxp-v6pw-ch6m)\n\n\u003cdetails\u003e\n\u003csummary\u003eDetails\u003c/summary\u003e\n\n\u003e ### Impact\n\u003e \n\u003e The REXML gem before 3.3.9 has a ReDoS vulnerability when it parses an XML that has many digits between `\u0026#` and `x...;` in a hex numeric character reference (`\u0026#x...;`).\n\u003e \n\u003e This does not happen with Ruby 3.2 or later. Ruby 3.1 is the only affected maintained Ruby. Note that Ruby 3.1 will reach EOL on 2025-03.\n\u003e \n\u003e ### Patches\n\u003e \n\u003e The REXML gem 3.3.9 or later include the patch to fix the vulnerability.\n\u003e \n\u003e ### Workarounds\n\u003e \n\u003e Use Ruby 3.2 or later instead of Ruby 3.1.\n\u003e \n\u003e ### References\n\u003e \n\u003e * https://www.ruby-lang.org/en/news/2024/10/28/redos-rexml-cve-2024-49761/: An announce on www.ruby-lang.org\n\u003e \n\n\u003c/details\u003e\n\n---\n\n### Affected Packages\n\n| Source | Package Name | Package Version |\n| --- | --- | --- |\n| lockfile:/Users/john.doe/projects/ruby/rubygems/Gemfile.lock | rexml | 3.2.6 |\n\n## Remediation\n\nTo fix these vulnerabilities, update the vulnerabilities past the listed fixed versions below.\n\n### Fixed Versions\n\n| Vulnerability ID | Package Name | Fixed Version |\n| --- | --- | --- |\n| GHSA-2rxp-v6pw-ch6m | rexml | 3.3.9 |\n\nIf you believe these vulnerabilities do not affect your code and wish to ignore them, add them to the ignore list in an\n`osv-scanner.toml` file located in the same directory as the lockfile containing the vulnerable dependency.\n\nSee the format and more options in our documentation here: https://google.github.io/osv-scanner/configuration/\n\nAdd or append these values to the following config files to ignore this vulnerability:\n\n`/Users/john.doe/projects/ruby/rubygems/osv-scanner.toml`\n\n```\n[[IgnoredVulns]]\nid = \"CVE-2024-49761\"\nreason = \"Your reason for ignoring this vulnerability\"\n```\n"
256
+ },
257
+ "id": "CVE-2024-49761",
258
+ "name": "CVE-2024-49761",
259
+ "properties": {
260
+ "security-severity": "7.5"
261
+ },
262
+ "relationships": [],
263
+ "shortDescription": {
264
+ "markdown": "CVE-2024-49761: REXML ReDoS vulnerability",
265
+ "text": "CVE-2024-49761: REXML ReDoS vulnerability"
266
+ }
267
+ },
268
+ {
269
+ "deprecatedIds": [
270
+ "CVE-2024-39908",
271
+ "GHSA-4xqq-m2hx-25v8"
272
+ ],
273
+ "fullDescription": {
274
+ "markdown": "### Impact\n\nThe REXML gem before 3.3.1 has some DoS vulnerabilities when it parses an XML that has many specific characters such as `\u003c`, `0` and `%\u003e`.\n\nIf you need to parse untrusted XMLs, you may be impacted to these vulnerabilities.\n\n### Patches\n\nThe REXML gem 3.3.2 or later include the patches to fix these vulnerabilities.\n\n### Workarounds\n\nDon't parse untrusted XMLs.\n\n### References\n\n* https://github.com/ruby/rexml/security/advisories/GHSA-vg3r-rm7w-2xgh : This is a similar vulnerability\n* https://www.ruby-lang.org/en/news/2024/07/16/dos-rexml-cve-2024-39908/",
275
+ "text": "### Impact\n\nThe REXML gem before 3.3.1 has some DoS vulnerabilities when it parses an XML that has many specific characters such as `\u003c`, `0` and `%\u003e`.\n\nIf you need to parse untrusted XMLs, you may be impacted to these vulnerabilities.\n\n### Patches\n\nThe REXML gem 3.3.2 or later include the patches to fix these vulnerabilities.\n\n### Workarounds\n\nDon't parse untrusted XMLs.\n\n### References\n\n* https://github.com/ruby/rexml/security/advisories/GHSA-vg3r-rm7w-2xgh : This is a similar vulnerability\n* https://www.ruby-lang.org/en/news/2024/07/16/dos-rexml-cve-2024-39908/"
276
+ },
277
+ "help": {
278
+ "markdown": "**Your dependency is vulnerable to [CVE-2024-39908](https://osv.dev/CVE-2024-39908)**.\n\n## [GHSA-4xqq-m2hx-25v8](https://osv.dev/GHSA-4xqq-m2hx-25v8)\n\n\u003cdetails\u003e\n\u003csummary\u003eDetails\u003c/summary\u003e\n\n\u003e ### Impact\n\u003e \n\u003e The REXML gem before 3.3.1 has some DoS vulnerabilities when it parses an XML that has many specific characters such as `\u003c`, `0` and `%\u003e`.\n\u003e \n\u003e If you need to parse untrusted XMLs, you may be impacted to these vulnerabilities.\n\u003e \n\u003e ### Patches\n\u003e \n\u003e The REXML gem 3.3.2 or later include the patches to fix these vulnerabilities.\n\u003e \n\u003e ### Workarounds\n\u003e \n\u003e Don't parse untrusted XMLs.\n\u003e \n\u003e ### References\n\u003e \n\u003e * https://github.com/ruby/rexml/security/advisories/GHSA-vg3r-rm7w-2xgh : This is a similar vulnerability\n\u003e * https://www.ruby-lang.org/en/news/2024/07/16/dos-rexml-cve-2024-39908/\n\n\u003c/details\u003e\n\n---\n\n### Affected Packages\n\n| Source | Package Name | Package Version |\n| --- | --- | --- |\n| lockfile:/Users/john.doe/projects/ruby/rubygems/Gemfile.lock | rexml | 3.2.6 |\n\n## Remediation\n\nTo fix these vulnerabilities, update the vulnerabilities past the listed fixed versions below.\n\n### Fixed Versions\n\n| Vulnerability ID | Package Name | Fixed Version |\n| --- | --- | --- |\n| GHSA-4xqq-m2hx-25v8 | rexml | 3.3.2 |\n\nIf you believe these vulnerabilities do not affect your code and wish to ignore them, add them to the ignore list in an\n`osv-scanner.toml` file located in the same directory as the lockfile containing the vulnerable dependency.\n\nSee the format and more options in our documentation here: https://google.github.io/osv-scanner/configuration/\n\nAdd or append these values to the following config files to ignore this vulnerability:\n\n`/Users/john.doe/projects/ruby/rubygems/osv-scanner.toml`\n\n```\n[[IgnoredVulns]]\nid = \"CVE-2024-39908\"\nreason = \"Your reason for ignoring this vulnerability\"\n```\n",
279
+ "text": "**Your dependency is vulnerable to [CVE-2024-39908](https://osv.dev/CVE-2024-39908)**.\n\n## [GHSA-4xqq-m2hx-25v8](https://osv.dev/GHSA-4xqq-m2hx-25v8)\n\n\u003cdetails\u003e\n\u003csummary\u003eDetails\u003c/summary\u003e\n\n\u003e ### Impact\n\u003e \n\u003e The REXML gem before 3.3.1 has some DoS vulnerabilities when it parses an XML that has many specific characters such as `\u003c`, `0` and `%\u003e`.\n\u003e \n\u003e If you need to parse untrusted XMLs, you may be impacted to these vulnerabilities.\n\u003e \n\u003e ### Patches\n\u003e \n\u003e The REXML gem 3.3.2 or later include the patches to fix these vulnerabilities.\n\u003e \n\u003e ### Workarounds\n\u003e \n\u003e Don't parse untrusted XMLs.\n\u003e \n\u003e ### References\n\u003e \n\u003e * https://github.com/ruby/rexml/security/advisories/GHSA-vg3r-rm7w-2xgh : This is a similar vulnerability\n\u003e * https://www.ruby-lang.org/en/news/2024/07/16/dos-rexml-cve-2024-39908/\n\n\u003c/details\u003e\n\n---\n\n### Affected Packages\n\n| Source | Package Name | Package Version |\n| --- | --- | --- |\n| lockfile:/Users/john.doe/projects/ruby/rubygems/Gemfile.lock | rexml | 3.2.6 |\n\n## Remediation\n\nTo fix these vulnerabilities, update the vulnerabilities past the listed fixed versions below.\n\n### Fixed Versions\n\n| Vulnerability ID | Package Name | Fixed Version |\n| --- | --- | --- |\n| GHSA-4xqq-m2hx-25v8 | rexml | 3.3.2 |\n\nIf you believe these vulnerabilities do not affect your code and wish to ignore them, add them to the ignore list in an\n`osv-scanner.toml` file located in the same directory as the lockfile containing the vulnerable dependency.\n\nSee the format and more options in our documentation here: https://google.github.io/osv-scanner/configuration/\n\nAdd or append these values to the following config files to ignore this vulnerability:\n\n`/Users/john.doe/projects/ruby/rubygems/osv-scanner.toml`\n\n```\n[[IgnoredVulns]]\nid = \"CVE-2024-39908\"\nreason = \"Your reason for ignoring this vulnerability\"\n```\n"
280
+ },
281
+ "id": "CVE-2024-39908",
282
+ "name": "CVE-2024-39908",
283
+ "properties": {
284
+ "security-severity": "6.9"
285
+ },
286
+ "relationships": [],
287
+ "shortDescription": {
288
+ "markdown": "CVE-2024-39908: REXML denial of service vulnerability",
289
+ "text": "CVE-2024-39908: REXML denial of service vulnerability"
290
+ }
291
+ },
292
+ {
293
+ "deprecatedIds": [
294
+ "CVE-2024-41946",
295
+ "GHSA-5866-49gr-22v4"
296
+ ],
297
+ "fullDescription": {
298
+ "markdown": "### Impact\n\nThe REXML gem before 3.3.2 has a DoS vulnerability when it parses an XML that has many entity expansions with SAX2 or pull parser API.\n\nIf you need to parse untrusted XMLs with SAX2 or pull parser API, you may be impacted to this vulnerability.\n\n### Patches\n\nThe REXML gem 3.3.3 or later include the patch to fix the vulnerability.\n\n### Workarounds\n\nDon't parse untrusted XMLs with SAX2 or pull parser API.\n\n### References\n\n* https://www.ruby-lang.org/en/news/2008/08/23/dos-vulnerability-in-rexml/ : This is a similar vulnerability\n* https://www.ruby-lang.org/en/news/2024/08/01/dos-rexml-cve-2024-41946/: An announce on www.ruby-lang.org",
299
+ "text": "### Impact\n\nThe REXML gem before 3.3.2 has a DoS vulnerability when it parses an XML that has many entity expansions with SAX2 or pull parser API.\n\nIf you need to parse untrusted XMLs with SAX2 or pull parser API, you may be impacted to this vulnerability.\n\n### Patches\n\nThe REXML gem 3.3.3 or later include the patch to fix the vulnerability.\n\n### Workarounds\n\nDon't parse untrusted XMLs with SAX2 or pull parser API.\n\n### References\n\n* https://www.ruby-lang.org/en/news/2008/08/23/dos-vulnerability-in-rexml/ : This is a similar vulnerability\n* https://www.ruby-lang.org/en/news/2024/08/01/dos-rexml-cve-2024-41946/: An announce on www.ruby-lang.org"
300
+ },
301
+ "help": {
302
+ "markdown": "**Your dependency is vulnerable to [CVE-2024-41946](https://osv.dev/CVE-2024-41946)**.\n\n## [GHSA-5866-49gr-22v4](https://osv.dev/GHSA-5866-49gr-22v4)\n\n\u003cdetails\u003e\n\u003csummary\u003eDetails\u003c/summary\u003e\n\n\u003e ### Impact\n\u003e \n\u003e The REXML gem before 3.3.2 has a DoS vulnerability when it parses an XML that has many entity expansions with SAX2 or pull parser API.\n\u003e \n\u003e If you need to parse untrusted XMLs with SAX2 or pull parser API, you may be impacted to this vulnerability.\n\u003e \n\u003e ### Patches\n\u003e \n\u003e The REXML gem 3.3.3 or later include the patch to fix the vulnerability.\n\u003e \n\u003e ### Workarounds\n\u003e \n\u003e Don't parse untrusted XMLs with SAX2 or pull parser API.\n\u003e \n\u003e ### References\n\u003e \n\u003e * https://www.ruby-lang.org/en/news/2008/08/23/dos-vulnerability-in-rexml/ : This is a similar vulnerability\n\u003e * https://www.ruby-lang.org/en/news/2024/08/01/dos-rexml-cve-2024-41946/: An announce on www.ruby-lang.org\n\n\u003c/details\u003e\n\n---\n\n### Affected Packages\n\n| Source | Package Name | Package Version |\n| --- | --- | --- |\n| lockfile:/Users/john.doe/projects/ruby/rubygems/Gemfile.lock | rexml | 3.2.6 |\n\n## Remediation\n\nTo fix these vulnerabilities, update the vulnerabilities past the listed fixed versions below.\n\n### Fixed Versions\n\n| Vulnerability ID | Package Name | Fixed Version |\n| --- | --- | --- |\n| GHSA-5866-49gr-22v4 | rexml | 3.3.3 |\n\nIf you believe these vulnerabilities do not affect your code and wish to ignore them, add them to the ignore list in an\n`osv-scanner.toml` file located in the same directory as the lockfile containing the vulnerable dependency.\n\nSee the format and more options in our documentation here: https://google.github.io/osv-scanner/configuration/\n\nAdd or append these values to the following config files to ignore this vulnerability:\n\n`/Users/john.doe/projects/ruby/rubygems/osv-scanner.toml`\n\n```\n[[IgnoredVulns]]\nid = \"CVE-2024-41946\"\nreason = \"Your reason for ignoring this vulnerability\"\n```\n",
303
+ "text": "**Your dependency is vulnerable to [CVE-2024-41946](https://osv.dev/CVE-2024-41946)**.\n\n## [GHSA-5866-49gr-22v4](https://osv.dev/GHSA-5866-49gr-22v4)\n\n\u003cdetails\u003e\n\u003csummary\u003eDetails\u003c/summary\u003e\n\n\u003e ### Impact\n\u003e \n\u003e The REXML gem before 3.3.2 has a DoS vulnerability when it parses an XML that has many entity expansions with SAX2 or pull parser API.\n\u003e \n\u003e If you need to parse untrusted XMLs with SAX2 or pull parser API, you may be impacted to this vulnerability.\n\u003e \n\u003e ### Patches\n\u003e \n\u003e The REXML gem 3.3.3 or later include the patch to fix the vulnerability.\n\u003e \n\u003e ### Workarounds\n\u003e \n\u003e Don't parse untrusted XMLs with SAX2 or pull parser API.\n\u003e \n\u003e ### References\n\u003e \n\u003e * https://www.ruby-lang.org/en/news/2008/08/23/dos-vulnerability-in-rexml/ : This is a similar vulnerability\n\u003e * https://www.ruby-lang.org/en/news/2024/08/01/dos-rexml-cve-2024-41946/: An announce on www.ruby-lang.org\n\n\u003c/details\u003e\n\n---\n\n### Affected Packages\n\n| Source | Package Name | Package Version |\n| --- | --- | --- |\n| lockfile:/Users/john.doe/projects/ruby/rubygems/Gemfile.lock | rexml | 3.2.6 |\n\n## Remediation\n\nTo fix these vulnerabilities, update the vulnerabilities past the listed fixed versions below.\n\n### Fixed Versions\n\n| Vulnerability ID | Package Name | Fixed Version |\n| --- | --- | --- |\n| GHSA-5866-49gr-22v4 | rexml | 3.3.3 |\n\nIf you believe these vulnerabilities do not affect your code and wish to ignore them, add them to the ignore list in an\n`osv-scanner.toml` file located in the same directory as the lockfile containing the vulnerable dependency.\n\nSee the format and more options in our documentation here: https://google.github.io/osv-scanner/configuration/\n\nAdd or append these values to the following config files to ignore this vulnerability:\n\n`/Users/john.doe/projects/ruby/rubygems/osv-scanner.toml`\n\n```\n[[IgnoredVulns]]\nid = \"CVE-2024-41946\"\nreason = \"Your reason for ignoring this vulnerability\"\n```\n"
304
+ },
305
+ "id": "CVE-2024-41946",
306
+ "name": "CVE-2024-41946",
307
+ "properties": {
308
+ "security-severity": "7.5"
309
+ },
310
+ "relationships": [],
311
+ "shortDescription": {
312
+ "markdown": "CVE-2024-41946: REXML DoS vulnerability",
313
+ "text": "CVE-2024-41946: REXML DoS vulnerability"
314
+ }
315
+ },
316
+ {
317
+ "deprecatedIds": [
318
+ "CVE-2024-41123",
319
+ "GHSA-r55c-59qm-vjw6"
320
+ ],
321
+ "fullDescription": {
322
+ "markdown": "### Impact\n\nThe REXML gem before 3.3.2 has some DoS vulnerabilities when it parses an XML that has many specific characters such as whitespace character, `\u003e]` and `]\u003e`.\n\nIf you need to parse untrusted XMLs, you may be impacted to these vulnerabilities.\n\n### Patches\n\nThe REXML gem 3.3.3 or later include the patches to fix these vulnerabilities.\n\n### Workarounds\n\nDon't parse untrusted XMLs.\n\n### References\n\n* https://github.com/ruby/rexml/security/advisories/GHSA-vg3r-rm7w-2xgh : This is a similar vulnerability\n* https://github.com/ruby/rexml/security/advisories/GHSA-4xqq-m2hx-25v8 : This is a similar vulnerability\n* https://www.ruby-lang.org/en/news/2024/08/01/dos-rexml-cve-2024-41123/: An announce on www.ruby-lang.org",
323
+ "text": "### Impact\n\nThe REXML gem before 3.3.2 has some DoS vulnerabilities when it parses an XML that has many specific characters such as whitespace character, `\u003e]` and `]\u003e`.\n\nIf you need to parse untrusted XMLs, you may be impacted to these vulnerabilities.\n\n### Patches\n\nThe REXML gem 3.3.3 or later include the patches to fix these vulnerabilities.\n\n### Workarounds\n\nDon't parse untrusted XMLs.\n\n### References\n\n* https://github.com/ruby/rexml/security/advisories/GHSA-vg3r-rm7w-2xgh : This is a similar vulnerability\n* https://github.com/ruby/rexml/security/advisories/GHSA-4xqq-m2hx-25v8 : This is a similar vulnerability\n* https://www.ruby-lang.org/en/news/2024/08/01/dos-rexml-cve-2024-41123/: An announce on www.ruby-lang.org"
324
+ },
325
+ "help": {
326
+ "markdown": "**Your dependency is vulnerable to [CVE-2024-41123](https://osv.dev/CVE-2024-41123)**.\n\n## [GHSA-r55c-59qm-vjw6](https://osv.dev/GHSA-r55c-59qm-vjw6)\n\n\u003cdetails\u003e\n\u003csummary\u003eDetails\u003c/summary\u003e\n\n\u003e ### Impact\n\u003e \n\u003e The REXML gem before 3.3.2 has some DoS vulnerabilities when it parses an XML that has many specific characters such as whitespace character, `\u003e]` and `]\u003e`.\n\u003e \n\u003e If you need to parse untrusted XMLs, you may be impacted to these vulnerabilities.\n\u003e \n\u003e ### Patches\n\u003e \n\u003e The REXML gem 3.3.3 or later include the patches to fix these vulnerabilities.\n\u003e \n\u003e ### Workarounds\n\u003e \n\u003e Don't parse untrusted XMLs.\n\u003e \n\u003e ### References\n\u003e \n\u003e * https://github.com/ruby/rexml/security/advisories/GHSA-vg3r-rm7w-2xgh : This is a similar vulnerability\n\u003e * https://github.com/ruby/rexml/security/advisories/GHSA-4xqq-m2hx-25v8 : This is a similar vulnerability\n\u003e * https://www.ruby-lang.org/en/news/2024/08/01/dos-rexml-cve-2024-41123/: An announce on www.ruby-lang.org\n\n\u003c/details\u003e\n\n---\n\n### Affected Packages\n\n| Source | Package Name | Package Version |\n| --- | --- | --- |\n| lockfile:/Users/john.doe/projects/ruby/rubygems/Gemfile.lock | rexml | 3.2.6 |\n\n## Remediation\n\nTo fix these vulnerabilities, update the vulnerabilities past the listed fixed versions below.\n\n### Fixed Versions\n\n| Vulnerability ID | Package Name | Fixed Version |\n| --- | --- | --- |\n| GHSA-r55c-59qm-vjw6 | rexml | 3.3.3 |\n\nIf you believe these vulnerabilities do not affect your code and wish to ignore them, add them to the ignore list in an\n`osv-scanner.toml` file located in the same directory as the lockfile containing the vulnerable dependency.\n\nSee the format and more options in our documentation here: https://google.github.io/osv-scanner/configuration/\n\nAdd or append these values to the following config files to ignore this vulnerability:\n\n`/Users/john.doe/projects/ruby/rubygems/osv-scanner.toml`\n\n```\n[[IgnoredVulns]]\nid = \"CVE-2024-41123\"\nreason = \"Your reason for ignoring this vulnerability\"\n```\n",
327
+ "text": "**Your dependency is vulnerable to [CVE-2024-41123](https://osv.dev/CVE-2024-41123)**.\n\n## [GHSA-r55c-59qm-vjw6](https://osv.dev/GHSA-r55c-59qm-vjw6)\n\n\u003cdetails\u003e\n\u003csummary\u003eDetails\u003c/summary\u003e\n\n\u003e ### Impact\n\u003e \n\u003e The REXML gem before 3.3.2 has some DoS vulnerabilities when it parses an XML that has many specific characters such as whitespace character, `\u003e]` and `]\u003e`.\n\u003e \n\u003e If you need to parse untrusted XMLs, you may be impacted to these vulnerabilities.\n\u003e \n\u003e ### Patches\n\u003e \n\u003e The REXML gem 3.3.3 or later include the patches to fix these vulnerabilities.\n\u003e \n\u003e ### Workarounds\n\u003e \n\u003e Don't parse untrusted XMLs.\n\u003e \n\u003e ### References\n\u003e \n\u003e * https://github.com/ruby/rexml/security/advisories/GHSA-vg3r-rm7w-2xgh : This is a similar vulnerability\n\u003e * https://github.com/ruby/rexml/security/advisories/GHSA-4xqq-m2hx-25v8 : This is a similar vulnerability\n\u003e * https://www.ruby-lang.org/en/news/2024/08/01/dos-rexml-cve-2024-41123/: An announce on www.ruby-lang.org\n\n\u003c/details\u003e\n\n---\n\n### Affected Packages\n\n| Source | Package Name | Package Version |\n| --- | --- | --- |\n| lockfile:/Users/john.doe/projects/ruby/rubygems/Gemfile.lock | rexml | 3.2.6 |\n\n## Remediation\n\nTo fix these vulnerabilities, update the vulnerabilities past the listed fixed versions below.\n\n### Fixed Versions\n\n| Vulnerability ID | Package Name | Fixed Version |\n| --- | --- | --- |\n| GHSA-r55c-59qm-vjw6 | rexml | 3.3.3 |\n\nIf you believe these vulnerabilities do not affect your code and wish to ignore them, add them to the ignore list in an\n`osv-scanner.toml` file located in the same directory as the lockfile containing the vulnerable dependency.\n\nSee the format and more options in our documentation here: https://google.github.io/osv-scanner/configuration/\n\nAdd or append these values to the following config files to ignore this vulnerability:\n\n`/Users/john.doe/projects/ruby/rubygems/osv-scanner.toml`\n\n```\n[[IgnoredVulns]]\nid = \"CVE-2024-41123\"\nreason = \"Your reason for ignoring this vulnerability\"\n```\n"
328
+ },
329
+ "id": "CVE-2024-41123",
330
+ "name": "CVE-2024-41123",
331
+ "properties": {
332
+ "security-severity": "7.5"
333
+ },
334
+ "relationships": [],
335
+ "shortDescription": {
336
+ "markdown": "CVE-2024-41123: REXML DoS vulnerability",
337
+ "text": "CVE-2024-41123: REXML DoS vulnerability"
338
+ }
339
+ },
340
+ {
341
+ "deprecatedIds": [
342
+ "CVE-2024-35176",
343
+ "GHSA-vg3r-rm7w-2xgh"
344
+ ],
345
+ "fullDescription": {
346
+ "markdown": "### Impact\n\nThe REXML gem before 3.2.6 has a DoS vulnerability when it parses an XML that has many `\u003c`s in an attribute value.\n\nIf you need to parse untrusted XMLs, you may be impacted to this vulnerability.\n\n### Patches\n\nThe REXML gem 3.2.7 or later include the patch to fix this vulnerability.\n\n### Workarounds\n\nDon't parse untrusted XMLs.\n\n### References\n\n* https://www.ruby-lang.org/en/news/2024/05/16/dos-rexml-cve-2024-35176/",
347
+ "text": "### Impact\n\nThe REXML gem before 3.2.6 has a DoS vulnerability when it parses an XML that has many `\u003c`s in an attribute value.\n\nIf you need to parse untrusted XMLs, you may be impacted to this vulnerability.\n\n### Patches\n\nThe REXML gem 3.2.7 or later include the patch to fix this vulnerability.\n\n### Workarounds\n\nDon't parse untrusted XMLs.\n\n### References\n\n* https://www.ruby-lang.org/en/news/2024/05/16/dos-rexml-cve-2024-35176/"
348
+ },
349
+ "help": {
350
+ "markdown": "**Your dependency is vulnerable to [CVE-2024-35176](https://osv.dev/CVE-2024-35176)**.\n\n## [GHSA-vg3r-rm7w-2xgh](https://osv.dev/GHSA-vg3r-rm7w-2xgh)\n\n\u003cdetails\u003e\n\u003csummary\u003eDetails\u003c/summary\u003e\n\n\u003e ### Impact\n\u003e \n\u003e The REXML gem before 3.2.6 has a DoS vulnerability when it parses an XML that has many `\u003c`s in an attribute value.\n\u003e \n\u003e If you need to parse untrusted XMLs, you may be impacted to this vulnerability.\n\u003e \n\u003e ### Patches\n\u003e \n\u003e The REXML gem 3.2.7 or later include the patch to fix this vulnerability.\n\u003e \n\u003e ### Workarounds\n\u003e \n\u003e Don't parse untrusted XMLs.\n\u003e \n\u003e ### References\n\u003e \n\u003e * https://www.ruby-lang.org/en/news/2024/05/16/dos-rexml-cve-2024-35176/\n\n\u003c/details\u003e\n\n---\n\n### Affected Packages\n\n| Source | Package Name | Package Version |\n| --- | --- | --- |\n| lockfile:/Users/john.doe/projects/ruby/rubygems/Gemfile.lock | rexml | 3.2.6 |\n\n## Remediation\n\nTo fix these vulnerabilities, update the vulnerabilities past the listed fixed versions below.\n\n### Fixed Versions\n\n| Vulnerability ID | Package Name | Fixed Version |\n| --- | --- | --- |\n| GHSA-vg3r-rm7w-2xgh | rexml | 3.2.7 |\n\nIf you believe these vulnerabilities do not affect your code and wish to ignore them, add them to the ignore list in an\n`osv-scanner.toml` file located in the same directory as the lockfile containing the vulnerable dependency.\n\nSee the format and more options in our documentation here: https://google.github.io/osv-scanner/configuration/\n\nAdd or append these values to the following config files to ignore this vulnerability:\n\n`/Users/john.doe/projects/ruby/rubygems/osv-scanner.toml`\n\n```\n[[IgnoredVulns]]\nid = \"CVE-2024-35176\"\nreason = \"Your reason for ignoring this vulnerability\"\n```\n",
351
+ "text": "**Your dependency is vulnerable to [CVE-2024-35176](https://osv.dev/CVE-2024-35176)**.\n\n## [GHSA-vg3r-rm7w-2xgh](https://osv.dev/GHSA-vg3r-rm7w-2xgh)\n\n\u003cdetails\u003e\n\u003csummary\u003eDetails\u003c/summary\u003e\n\n\u003e ### Impact\n\u003e \n\u003e The REXML gem before 3.2.6 has a DoS vulnerability when it parses an XML that has many `\u003c`s in an attribute value.\n\u003e \n\u003e If you need to parse untrusted XMLs, you may be impacted to this vulnerability.\n\u003e \n\u003e ### Patches\n\u003e \n\u003e The REXML gem 3.2.7 or later include the patch to fix this vulnerability.\n\u003e \n\u003e ### Workarounds\n\u003e \n\u003e Don't parse untrusted XMLs.\n\u003e \n\u003e ### References\n\u003e \n\u003e * https://www.ruby-lang.org/en/news/2024/05/16/dos-rexml-cve-2024-35176/\n\n\u003c/details\u003e\n\n---\n\n### Affected Packages\n\n| Source | Package Name | Package Version |\n| --- | --- | --- |\n| lockfile:/Users/john.doe/projects/ruby/rubygems/Gemfile.lock | rexml | 3.2.6 |\n\n## Remediation\n\nTo fix these vulnerabilities, update the vulnerabilities past the listed fixed versions below.\n\n### Fixed Versions\n\n| Vulnerability ID | Package Name | Fixed Version |\n| --- | --- | --- |\n| GHSA-vg3r-rm7w-2xgh | rexml | 3.2.7 |\n\nIf you believe these vulnerabilities do not affect your code and wish to ignore them, add them to the ignore list in an\n`osv-scanner.toml` file located in the same directory as the lockfile containing the vulnerable dependency.\n\nSee the format and more options in our documentation here: https://google.github.io/osv-scanner/configuration/\n\nAdd or append these values to the following config files to ignore this vulnerability:\n\n`/Users/john.doe/projects/ruby/rubygems/osv-scanner.toml`\n\n```\n[[IgnoredVulns]]\nid = \"CVE-2024-35176\"\nreason = \"Your reason for ignoring this vulnerability\"\n```\n"
352
+ },
353
+ "id": "CVE-2024-35176",
354
+ "name": "CVE-2024-35176",
355
+ "properties": {
356
+ "security-severity": "5.3"
357
+ },
358
+ "relationships": [],
359
+ "shortDescription": {
360
+ "markdown": "CVE-2024-35176: REXML contains a denial of service vulnerability",
361
+ "text": "CVE-2024-35176: REXML contains a denial of service vulnerability"
362
+ }
363
+ },
364
+ {
365
+ "deprecatedIds": [
366
+ "CVE-2024-43398",
367
+ "GHSA-vmwr-mc7x-5vc3"
368
+ ],
369
+ "fullDescription": {
370
+ "markdown": "### Impact\n\nThe REXML gem before 3.3.6 has a DoS vulnerability when it parses an XML that has many deep elements that have same local name attributes.\n\nIf you need to parse untrusted XMLs with tree parser API like `REXML::Document.new`, you may be impacted to this vulnerability. If you use other parser APIs such as stream parser API and SAX2 parser API, this vulnerability is not affected.\n\n### Patches\n\nThe REXML gem 3.3.6 or later include the patch to fix the vulnerability.\n\n### Workarounds\n\nDon't parse untrusted XMLs with tree parser API.\n\n### References\n\n* https://www.ruby-lang.org/en/news/2024/08/22/dos-rexml-cve-2024-43398/ : An announce on www.ruby-lang.org\n",
371
+ "text": "### Impact\n\nThe REXML gem before 3.3.6 has a DoS vulnerability when it parses an XML that has many deep elements that have same local name attributes.\n\nIf you need to parse untrusted XMLs with tree parser API like `REXML::Document.new`, you may be impacted to this vulnerability. If you use other parser APIs such as stream parser API and SAX2 parser API, this vulnerability is not affected.\n\n### Patches\n\nThe REXML gem 3.3.6 or later include the patch to fix the vulnerability.\n\n### Workarounds\n\nDon't parse untrusted XMLs with tree parser API.\n\n### References\n\n* https://www.ruby-lang.org/en/news/2024/08/22/dos-rexml-cve-2024-43398/ : An announce on www.ruby-lang.org\n"
372
+ },
373
+ "help": {
374
+ "markdown": "**Your dependency is vulnerable to [CVE-2024-43398](https://osv.dev/CVE-2024-43398)**.\n\n## [GHSA-vmwr-mc7x-5vc3](https://osv.dev/GHSA-vmwr-mc7x-5vc3)\n\n\u003cdetails\u003e\n\u003csummary\u003eDetails\u003c/summary\u003e\n\n\u003e ### Impact\n\u003e \n\u003e The REXML gem before 3.3.6 has a DoS vulnerability when it parses an XML that has many deep elements that have same local name attributes.\n\u003e \n\u003e If you need to parse untrusted XMLs with tree parser API like `REXML::Document.new`, you may be impacted to this vulnerability. If you use other parser APIs such as stream parser API and SAX2 parser API, this vulnerability is not affected.\n\u003e \n\u003e ### Patches\n\u003e \n\u003e The REXML gem 3.3.6 or later include the patch to fix the vulnerability.\n\u003e \n\u003e ### Workarounds\n\u003e \n\u003e Don't parse untrusted XMLs with tree parser API.\n\u003e \n\u003e ### References\n\u003e \n\u003e * https://www.ruby-lang.org/en/news/2024/08/22/dos-rexml-cve-2024-43398/ : An announce on www.ruby-lang.org\n\u003e \n\n\u003c/details\u003e\n\n---\n\n### Affected Packages\n\n| Source | Package Name | Package Version |\n| --- | --- | --- |\n| lockfile:/Users/john.doe/projects/ruby/rubygems/Gemfile.lock | rexml | 3.2.6 |\n\n## Remediation\n\nTo fix these vulnerabilities, update the vulnerabilities past the listed fixed versions below.\n\n### Fixed Versions\n\n| Vulnerability ID | Package Name | Fixed Version |\n| --- | --- | --- |\n| GHSA-vmwr-mc7x-5vc3 | rexml | 3.3.6 |\n\nIf you believe these vulnerabilities do not affect your code and wish to ignore them, add them to the ignore list in an\n`osv-scanner.toml` file located in the same directory as the lockfile containing the vulnerable dependency.\n\nSee the format and more options in our documentation here: https://google.github.io/osv-scanner/configuration/\n\nAdd or append these values to the following config files to ignore this vulnerability:\n\n`/Users/john.doe/projects/ruby/rubygems/osv-scanner.toml`\n\n```\n[[IgnoredVulns]]\nid = \"CVE-2024-43398\"\nreason = \"Your reason for ignoring this vulnerability\"\n```\n",
375
+ "text": "**Your dependency is vulnerable to [CVE-2024-43398](https://osv.dev/CVE-2024-43398)**.\n\n## [GHSA-vmwr-mc7x-5vc3](https://osv.dev/GHSA-vmwr-mc7x-5vc3)\n\n\u003cdetails\u003e\n\u003csummary\u003eDetails\u003c/summary\u003e\n\n\u003e ### Impact\n\u003e \n\u003e The REXML gem before 3.3.6 has a DoS vulnerability when it parses an XML that has many deep elements that have same local name attributes.\n\u003e \n\u003e If you need to parse untrusted XMLs with tree parser API like `REXML::Document.new`, you may be impacted to this vulnerability. If you use other parser APIs such as stream parser API and SAX2 parser API, this vulnerability is not affected.\n\u003e \n\u003e ### Patches\n\u003e \n\u003e The REXML gem 3.3.6 or later include the patch to fix the vulnerability.\n\u003e \n\u003e ### Workarounds\n\u003e \n\u003e Don't parse untrusted XMLs with tree parser API.\n\u003e \n\u003e ### References\n\u003e \n\u003e * https://www.ruby-lang.org/en/news/2024/08/22/dos-rexml-cve-2024-43398/ : An announce on www.ruby-lang.org\n\u003e \n\n\u003c/details\u003e\n\n---\n\n### Affected Packages\n\n| Source | Package Name | Package Version |\n| --- | --- | --- |\n| lockfile:/Users/john.doe/projects/ruby/rubygems/Gemfile.lock | rexml | 3.2.6 |\n\n## Remediation\n\nTo fix these vulnerabilities, update the vulnerabilities past the listed fixed versions below.\n\n### Fixed Versions\n\n| Vulnerability ID | Package Name | Fixed Version |\n| --- | --- | --- |\n| GHSA-vmwr-mc7x-5vc3 | rexml | 3.3.6 |\n\nIf you believe these vulnerabilities do not affect your code and wish to ignore them, add them to the ignore list in an\n`osv-scanner.toml` file located in the same directory as the lockfile containing the vulnerable dependency.\n\nSee the format and more options in our documentation here: https://google.github.io/osv-scanner/configuration/\n\nAdd or append these values to the following config files to ignore this vulnerability:\n\n`/Users/john.doe/projects/ruby/rubygems/osv-scanner.toml`\n\n```\n[[IgnoredVulns]]\nid = \"CVE-2024-43398\"\nreason = \"Your reason for ignoring this vulnerability\"\n```\n"
376
+ },
377
+ "id": "CVE-2024-43398",
378
+ "name": "CVE-2024-43398",
379
+ "properties": {
380
+ "security-severity": "8.2"
381
+ },
382
+ "relationships": [],
383
+ "shortDescription": {
384
+ "markdown": "CVE-2024-43398: REXML denial of service vulnerability",
385
+ "text": "CVE-2024-43398: REXML denial of service vulnerability"
386
+ }
387
+ }
388
+ ],
389
+ "supportedTaxonomies": [],
390
+ "taxa": [],
391
+ "version": "2.2.0"
392
+ },
393
+ "extensions": []
394
+ },
395
+ "translations": [],
396
+ "versionControlProvenance": [],
397
+ "webRequests": [],
398
+ "webResponses": []
399
+ }
400
+ ],
401
+ "properties": {}
402
+ }