Rails is a web-application framework. Starting in version 7.1.0, there is a possible ReDoS vulnerability in the Accept header parsing routines of Action Dispatch. This vulnerability is patched in 7.1.3.1. Ruby 3.2 has mitigations for this problem, so Rails applications using Ruby 3.2 or newer are unaffected.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-0663 | Rails is a web-application framework. Starting in version 7.1.0, there is a possible ReDoS vulnerability in the Accept header parsing routines of Action Dispatch. This vulnerability is patched in 7.1.3.1. Ruby 3.2 has mitigations for this problem, so Rails applications using Ruby 3.2 or newer are unaffected. |
Github GHSA |
GHSA-jjhx-jhvp-74wq | Rails has possible ReDoS vulnerability in Accept header parsing in Action Dispatch |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Fri, 14 Feb 2025 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Ruby-lang
Ruby-lang ruby Rubyonrails Rubyonrails rails |
|
| CPEs | cpe:2.3:a:ruby-lang:ruby:*:*:*:*:*:*:*:* cpe:2.3:a:rubyonrails:rails:*:*:*:*:*:*:*:* |
|
| Vendors & Products |
Ruby-lang
Ruby-lang ruby Rubyonrails Rubyonrails rails |
Thu, 13 Feb 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Rails
Rails rails |
|
| CPEs | cpe:2.3:a:rails:rails:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Rails
Rails rails |
|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-02-13T17:41:05.743Z
Reserved: 2024-02-14T17:40:03.688Z
Link: CVE-2024-26142
Updated: 2024-08-01T23:59:32.697Z
Status : Analyzed
Published: 2024-02-27T16:15:46.600
Modified: 2025-02-14T16:22:23.763
Link: CVE-2024-26142
OpenCVE Enrichment
No data.
EUVD
Github GHSA