CVE-2023-22795
rubygem-actionpack: Denial of Service in Action Dispatch
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
A regular expression based DoS vulnerability in Action Dispatch <6.1.7.1 and <7.0.4.1 related to the If-None-Match header. A specially crafted HTTP If-None-Match header can cause the regular expression engine to enter a state of catastrophic backtracking, when on a version of Ruby below 3.2.0. This can cause the process to use large amounts of CPU and memory, leading to a possible DoS vulnerability All users running an affected release should either upgrade or use one of the workarounds immediately.
A flaw was found in the rubygem-actionpack. RubyGem's actionpack gem is vulnerable to a denial of service caused by a regular expression denial of service (ReDoS) flaw in Action Dispatch related to the If-None-Match header. By sending a specially-crafted HTTP If-None-Match header, a remote attacker can use large amounts of CPU and memory, resulting in a denial of service.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2023-01-06 CVE Reserved
- 2023-02-09 CVE Published
- 2024-08-02 CVE Updated
- 2024-09-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-400: Uncontrolled Resource Consumption
- CWE-1333: Inefficient Regular Expression Complexity
CAPEC
References (5)
URL | Tag | Source |
---|---|---|
https://security.netapp.com/advisory/ntap-20240202-0010 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://discuss.rubyonrails.org/t/cve-2023-22795-possible-redos-based-dos-vulnerability-in-action-dispatch/82118 | 2024-02-02 |
URL | Date | SRC |
---|---|---|
https://www.debian.org/security/2023/dsa-5372 | 2024-02-02 | |
https://access.redhat.com/security/cve/CVE-2023-22795 | 2023-11-08 | |
https://bugzilla.redhat.com/show_bug.cgi?id=2164799 | 2023-11-08 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Rubyonrails Search vendor "Rubyonrails" | Rails Search vendor "Rubyonrails" for product "Rails" | < 6.1.7.1 Search vendor "Rubyonrails" for product "Rails" and version " < 6.1.7.1" | - |
Affected
| in | Ruby-lang Search vendor "Ruby-lang" | Ruby Search vendor "Ruby-lang" for product "Ruby" | < 3.2.0 Search vendor "Ruby-lang" for product "Ruby" and version " < 3.2.0" | - |
Safe
|
Rubyonrails Search vendor "Rubyonrails" | Rails Search vendor "Rubyonrails" for product "Rails" | >= 7.0.0 < 7.0.4.1 Search vendor "Rubyonrails" for product "Rails" and version " >= 7.0.0 < 7.0.4.1" | - |
Affected
| in | Ruby-lang Search vendor "Ruby-lang" | Ruby Search vendor "Ruby-lang" for product "Ruby" | < 3.2.0 Search vendor "Ruby-lang" for product "Ruby" and version " < 3.2.0" | - |
Safe
|
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 11.0 Search vendor "Debian" for product "Debian Linux" and version "11.0" | - |
Affected
|