CVE-2019-16201
ruby: Regular expression denial of service vulnerability of WEBrick's Digest authentication
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
WEBrick::HTTPAuth::DigestAuth in Ruby through 2.4.7, 2.5.x through 2.5.6, and 2.6.x through 2.6.4 has a regular expression Denial of Service cause by looping/backtracking. A victim must expose a WEBrick server that uses DigestAuth to the Internet or a untrusted network.
La función WEBrick::HTTPAuth::DigestAuth en Ruby versiones hasta la versión 2.4.7, versiones 2.5.x hasta 2.5.6 y versiones 2.6.x hasta 2.6.4, tiene una expresión regular de denegación de servicio causada mediante looping/backtracking. Una víctima debe exponer un servidor WEBrick que usa DigestAuth en Internet o una red no segura.
It was discovered that Ruby incorrectly handled certain files. An attacker could possibly use this issue to pass path matching what can lead to an unauthorized access. It was discovered that Ruby incorrectly handled certain regular expressions. An attacker could use this issue to cause a denial of service. It was discovered that Ruby incorrectly handled certain HTTP headers. An attacker could possibly use this issue to execute arbitrary code. Various other issues were also addressed.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2019-09-10 CVE Reserved
- 2019-11-26 CVE Published
- 2024-08-05 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-287: Improper Authentication
- CWE-400: Uncontrolled Resource Consumption
CAPEC
References (13)
URL | Tag | Source |
---|---|---|
https://hackerone.com/reports/661722 | Third Party Advisory | |
https://lists.debian.org/debian-lts-announce/2019/11/msg00025.html | Mailing List |
|
https://lists.debian.org/debian-lts-announce/2019/12/msg00009.html | Mailing List |
|
https://lists.debian.org/debian-lts-announce/2020/08/msg00027.html | Mailing List |
|
https://lists.debian.org/debian-lts-announce/2023/04/msg00033.html | Mailing List |
|
https://seclists.org/bugtraq/2019/Dec/31 | Mailing List |
|
https://seclists.org/bugtraq/2019/Dec/32 | Mailing List |
|
https://www.oracle.com/security-alerts/cpujan2020.html |
|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00041.html | 2023-04-30 | |
https://security.gentoo.org/glsa/202003-06 | 2023-04-30 | |
https://www.debian.org/security/2019/dsa-4587 | 2023-04-30 | |
https://access.redhat.com/security/cve/CVE-2019-16201 | 2022-02-21 | |
https://bugzilla.redhat.com/show_bug.cgi?id=1773728 | 2022-02-21 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Ruby-lang Search vendor "Ruby-lang" | Ruby Search vendor "Ruby-lang" for product "Ruby" | >= 2.4.0 <= 2.4.7 Search vendor "Ruby-lang" for product "Ruby" and version " >= 2.4.0 <= 2.4.7" | - |
Affected
| ||||||
Ruby-lang Search vendor "Ruby-lang" | Ruby Search vendor "Ruby-lang" for product "Ruby" | >= 2.5.0 <= 2.5.6 Search vendor "Ruby-lang" for product "Ruby" and version " >= 2.5.0 <= 2.5.6" | - |
Affected
| ||||||
Ruby-lang Search vendor "Ruby-lang" | Ruby Search vendor "Ruby-lang" for product "Ruby" | >= 2.6.0 <= 2.6.4 Search vendor "Ruby-lang" for product "Ruby" and version " >= 2.6.0 <= 2.6.4" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 8.0 Search vendor "Debian" for product "Debian Linux" and version "8.0" | - |
Affected
|