Description
A regular expression based DoS vulnerability in Action Dispatch <6.1.7.1 and <7.0.4.1 related to the If-None-Match header. A specially crafted HTTP If-None-Match header can cause the regular expression engine to enter a state of catastrophic backtracking, when on a version of Ruby below 3.2.0. This can cause the process to use large amounts of CPU and memory, leading to a possible DoS vulnerability All users running an affected release should either upgrade or use one of the workarounds immediately.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-5372-1 | rails security update |
Github GHSA |
GHSA-8xww-x3g3-6jcv | ReDoS based DoS vulnerability in Action Dispatch |
References
History
No history.
Status: PUBLISHED
Assigner: hackerone
Published:
Updated: 2024-08-02T10:20:30.901Z
Reserved: 2023-01-06T00:00:00.000Z
Link: CVE-2023-22795
No data.
Status : Modified
Published: 2023-02-09T20:15:11.420
Modified: 2024-11-21T07:45:26.440
Link: CVE-2023-22795
OpenCVE Enrichment
No data.
Debian DSA
Github GHSA