A regular expression based DoS vulnerability in Action Dispatch <6.1.7.1 and <7.0.4.1 related to the If-None-Match header. A specially crafted HTTP If-None-Match header can cause the regular expression engine to enter a state of catastrophic backtracking, when on a version of Ruby below 3.2.0. This can cause the process to use large amounts of CPU and memory, leading to a possible DoS vulnerability All users running an affected release should either upgrade or use one of the workarounds immediately.
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: hackerone

Published: 2023-02-09T00:00:00

Updated: 2024-08-02T10:20:30.901Z

Reserved: 2023-01-06T00:00:00

Link: CVE-2023-22795

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2023-02-09T20:15:11.420

Modified: 2024-02-02T14:15:53.343

Link: CVE-2023-22795

cve-icon Redhat

Severity : Moderate

Publid Date: 2023-01-20T00:00:00Z

Links: CVE-2023-22795 - Bugzilla