Description
A regular expression based DoS vulnerability in Action Dispatch <6.0.6.1,< 6.1.7.1, and <7.0.4.1. Specially crafted cookies, in combination with a specially crafted X_FORWARDED_HOST header can cause the regular expression engine to enter a state of catastrophic backtracking. This can cause the process to use large amounts of CPU and memory, leading to a possible DoS vulnerability All users running an affected release should either upgrade or use one of the workarounds immediately.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-5372-1 | rails security update |
EUVD |
EUVD-2023-0513 | A regular expression based DoS vulnerability in Action Dispatch <6.0.6.1,< 6.1.7.1, and <7.0.4.1. Specially crafted cookies, in combination with a specially crafted X_FORWARDED_HOST header can cause the regular expression engine to enter a state of catastrophic backtracking. This can cause the process to use large amounts of CPU and memory, leading to a possible DoS vulnerability All users running an affected release should either upgrade or use one of the workarounds immediately. |
Github GHSA |
GHSA-p84v-45xj-wwqj | ReDoS based DoS vulnerability in Action Dispatch |
References
History
Mon, 24 Mar 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: hackerone
Published:
Updated: 2025-03-24T20:30:41.601Z
Reserved: 2023-01-06T00:00:00.000Z
Link: CVE-2023-22792
Updated: 2024-08-02T10:20:30.853Z
Status : Modified
Published: 2023-02-09T20:15:11.290
Modified: 2025-03-24T21:15:16.240
Link: CVE-2023-22792
OpenCVE Enrichment
No data.
Debian DSA
EUVD
Github GHSA