libxmljs is vulnerable to a type confusion vulnerability when parsing a specially crafted XML while invoking a function on the result of attrs() that was called on a parsed node. This vulnerability might lead to denial of service (on both 32-bit systems and 64-bit systems), data leak, infinite loop and remote code execution (on 32-bit systems with the XML_PARSE_HUGE flag enabled).
References
| Link | Resource |
|---|---|
| https://github.com/libxmljs/libxmljs/issues/645 | Exploit Issue Tracking |
| https://research.jfrog.com/vulnerabilities/libxmljs-attrs-type-confusion-rce-jfsa-2024-001033988/ | Exploit Third Party Advisory |
| https://github.com/libxmljs/libxmljs/issues/645 | Exploit Issue Tracking |
| https://research.jfrog.com/vulnerabilities/libxmljs-attrs-type-confusion-rce-jfsa-2024-001033988/ | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2024-05-02 19:15
Updated : 2025-10-10 18:20
NVD link : CVE-2024-34391
Mitre link : CVE-2024-34391
CVE.ORG link : CVE-2024-34391
JSON object : View
Products Affected
libxmljs_project
- libxmljs
CWE
CWE-843
Access of Resource Using Incompatible Type ('Type Confusion')
