Rails is a web-application framework. Starting in version 7.1.0, there is a possible ReDoS vulnerability in the Accept header parsing routines of Action Dispatch. This vulnerability is patched in 7.1.3.1. Ruby 3.2 has mitigations for this problem, so Rails applications using Ruby 3.2 or newer are unaffected.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
EUVD-2024-0663 | Rails is a web-application framework. Starting in version 7.1.0, there is a possible ReDoS vulnerability in the Accept header parsing routines of Action Dispatch. This vulnerability is patched in 7.1.3.1. Ruby 3.2 has mitigations for this problem, so Rails applications using Ruby 3.2 or newer are unaffected. |
![]() |
GHSA-jjhx-jhvp-74wq | Rails has possible ReDoS vulnerability in Accept header parsing in Action Dispatch |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Fri, 14 Feb 2025 16:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Ruby-lang
Ruby-lang ruby Rubyonrails Rubyonrails rails |
|
CPEs | cpe:2.3:a:ruby-lang:ruby:*:*:*:*:*:*:*:* cpe:2.3:a:rubyonrails:rails:*:*:*:*:*:*:*:* |
|
Vendors & Products |
Ruby-lang
Ruby-lang ruby Rubyonrails Rubyonrails rails |
Thu, 13 Feb 2025 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Rails
Rails rails |
|
CPEs | cpe:2.3:a:rails:rails:*:*:*:*:*:*:*:* | |
Vendors & Products |
Rails
Rails rails |
|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-02-13T17:41:05.743Z
Reserved: 2024-02-14T17:40:03.688Z
Link: CVE-2024-26142

Updated: 2024-08-01T23:59:32.697Z

Status : Analyzed
Published: 2024-02-27T16:15:46.600
Modified: 2025-02-14T16:22:23.763
Link: CVE-2024-26142


No data.