TencentOS Server 3: ruby:3.1 (TSSA-2025:0359)

high Nessus Plugin ID 239788

Synopsis

The remote TencentOS Server 3 host is missing one or more security updates.

Description

The version of Tencent Linux installed on the remote TencentOS Server 3 host is prior to tested version. It is, therefore, affected by multiple vulnerabilities as referenced in the TSSA-2025:0359 advisory.

Package updates are available for TencentOS Server 3 that fix the following vulnerabilities:

CVE-2024-39908:
REXML is an XML toolkit for Ruby. The REXML gem before 3.3.1 has some DoS vulnerabilities when it parses an XML that has many specific characters such as <, 0 and %>. If you need to parse untrusted XMLs, you many be impacted to these vulnerabilities. The REXML gem 3.3.2 or later include the patches to fix these vulnerabilities. Users are advised to upgrade. Users unable to upgrade should avoid parsing untrusted XML strings.

CVE-2024-41123:
REXML is an XML toolkit for Ruby. The REXML gem before 3.3.2 has some DoS vulnerabilities when it parses an XML that has many specific characters such as whitespace character, >] and ]>. The REXML gem 3.3.3 or later include the patches to fix these vulnerabilities.

CVE-2024-41946:
REXML is an XML toolkit for Ruby. The REXML gem 3.3.2 has a DoS vulnerability when it parses an XML that has many entity expansions with SAX2 or pull parser API. The REXML gem 3.3.3 or later include the patch to fix the vulnerability.

CVE-2024-43398:
REXML is an XML toolkit for Ruby. The REXML gem before 3.3.6 has a DoS vulnerability when it parses an XML that has many deep elements that have same local name attributes. If you need to parse untrusted XMLs with tree parser API like REXML::Document.new, you may be impacted to this vulnerability. If you use other parser APIs such as stream parser API and SAX2 parser API, this vulnerability is not affected. The REXML gem 3.3.6 or later include the patch to fix the vulnerability.

CVE-2025-27219:
In the CGI gem before 0.4.2 for Ruby, the CGI::Cookie.parse method in the CGI library contains a potential Denial of Service (DoS) vulnerability. The method does not impose any limit on the length of the raw cookie value it processes. This oversight can lead to excessive resource consumption when parsing extremely large cookies.

CVE-2025-27220:
In the CGI gem before 0.4.2 for Ruby, a Regular Expression Denial of Service (ReDoS) vulnerability exists in the Util#escapeElement method.

CVE-2025-27221:
In the URI gem before 1.0.3 for Ruby, the URI handling methods (URI.join, URI#merge, URI#+) have an inadvertent leakage of authentication credentials because userinfo is retained even after changing the host.

Tenable has extracted the preceding description block directly from the Tencent Linux security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

https://mirrors.tencent.com/tlinux/errata/tssa-20250359.xml

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39908

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41123

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41946

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43398

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27219

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27220

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27221

Plugin Details

Severity: High

ID: 239788

File Name: tencentos_TSSA_2025_0359.nasl

Version: 1.1

Type: local

Published: 6/16/2025

Updated: 6/16/2025

Supported Sensors: Nessus

Vulnerability Information

CPE: p-cpe:/a:tencent:tencentos_server:ruby, cpe:/o:tencent:tencentos_server:3, p-cpe:/a:tencent:tencentos_server:rubygem-pg, p-cpe:/a:tencent:tencentos_server:rubygem-mysql2, p-cpe:/a:tencent:tencentos_server:rubygem-abrt

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/etc/os-release, Host/TencentOS/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 4/23/2025

Vulnerability Publication Date: 4/23/2025