CVE-2020-7663
rubygem-websocket-extensions: ReDoS vulnerability in Sec-WebSocket-Extensions parser
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
websocket-extensions ruby module prior to 0.1.5 allows Denial of Service (DoS) via Regex Backtracking. The extension parser may take quadratic time when parsing a header containing an unclosed string parameter value whose content is a repeating two-byte sequence of a backslash and some other character. This could be abused by an attacker to conduct Regex Denial Of Service (ReDoS) on a single-threaded server by providing a malicious payload with the Sec-WebSocket-Extensions header.
El módulo de ruby websocket-extensions versiones anteriores a 0.1.5, permite una denegación de servicio (DoS) por medio de Regex Backtracking. El analizador de extensiones puede tomar un tiempo cuadrático cuando analiza un encabezado que contiene un valor de parámetro de cadena no cerrado cuyo contenido es una secuencia repetitiva de dos bytes de una barra diagonal inversa y algún otro carácter. Esto podría ser abusado por un atacante para conducir una Denegación de Servicio de Regex (ReDoS) en un servidor de un subproceso único al proporcionar una carga útil maliciosa con el encabezado Sec-WebSocket-Extensions.
A flaw was found in the websocket-extensions ruby module in versions prior to 0.1.5. The parser may take quadratic time when parsing a header containing an unclosed string parameter value whose content is a repeating two-byte sequence of a backslash and another character. When abused by an attacker, a Regex denial of service on a single-threaded server could occur. The highest threat from this vulnerability is to system availability.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2020-01-21 CVE Reserved
- 2020-06-02 CVE Published
- 2024-08-04 CVE Updated
- 2024-08-04 First Exploit
- 2024-09-26 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-400: Uncontrolled Resource Consumption
CAPEC
References (8)
URL | Tag | Source |
---|---|---|
https://blog.jcoglan.com/2020/06/02/redos-vulnerability-in-websocket-extensions | Third Party Advisory | |
https://github.com/faye/websocket-extensions-ruby/security/advisories/GHSA-g6wq-qcwm-j5g2 | Third Party Advisory | |
https://lists.debian.org/debian-lts-announce/2020/08/msg00031.html | Mailing List |
URL | Date | SRC |
---|---|---|
https://snyk.io/vuln/SNYK-RUBY-WEBSOCKETEXTENSIONS-570830 | 2024-08-04 |
URL | Date | SRC |
---|---|---|
https://github.com/faye/websocket-extensions-ruby/commit/aa156a439da681361ed6f53f1a8131892418838b | 2023-01-20 |
URL | Date | SRC |
---|---|---|
https://usn.ubuntu.com/4502-1 | 2023-01-20 | |
https://access.redhat.com/security/cve/CVE-2020-7663 | 2020-10-27 | |
https://bugzilla.redhat.com/show_bug.cgi?id=1845978 | 2020-10-27 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Websocket-extensions Project Search vendor "Websocket-extensions Project" | Websocket-extensions Search vendor "Websocket-extensions Project" for product "Websocket-extensions" | < 0.1.5 Search vendor "Websocket-extensions Project" for product "Websocket-extensions" and version " < 0.1.5" | ruby |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 9.0 Search vendor "Debian" for product "Debian Linux" and version "9.0" | - |
Affected
| ||||||
Canonical Search vendor "Canonical" | Ubuntu Linux Search vendor "Canonical" for product "Ubuntu Linux" | 16.04 Search vendor "Canonical" for product "Ubuntu Linux" and version "16.04" | esm |
Affected
| ||||||
Canonical Search vendor "Canonical" | Ubuntu Linux Search vendor "Canonical" for product "Ubuntu Linux" | 18.04 Search vendor "Canonical" for product "Ubuntu Linux" and version "18.04" | lts |
Affected
| ||||||
Canonical Search vendor "Canonical" | Ubuntu Linux Search vendor "Canonical" for product "Ubuntu Linux" | 20.04 Search vendor "Canonical" for product "Ubuntu Linux" and version "20.04" | lts |
Affected
|