Description
A regular expression based DoS vulnerability in Action Dispatch <6.1.7.1 and <7.0.4.1 related to the If-None-Match header. A specially crafted HTTP If-None-Match header can cause the regular expression engine to enter a state of catastrophic backtracking, when on a version of Ruby below 3.2.0. This can cause the process to use large amounts of CPU and memory, leading to a possible DoS vulnerability All users running an affected release should either upgrade or use one of the workarounds immediately.
Published: 2023-02-09
Score: 7.5 High
EPSS: 1.5% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DSA Debian DSA DSA-5372-1 rails security update
Github GHSA Github GHSA GHSA-8xww-x3g3-6jcv ReDoS based DoS vulnerability in Action Dispatch
History

No history.

Subscriptions

Debian Debian Linux
Redhat Satellite
Ruby-lang Ruby
Rubyonrails Rails
cve-icon MITRE

Status: PUBLISHED

Assigner: hackerone

Published:

Updated: 2024-08-02T10:20:30.901Z

Reserved: 2023-01-06T00:00:00.000Z

Link: CVE-2023-22795

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2023-02-09T20:15:11.420

Modified: 2024-11-21T07:45:26.440

Link: CVE-2023-22795

cve-icon Redhat

Severity : Moderate

Publid Date: 2023-01-20T00:00:00Z

Links: CVE-2023-22795 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses