Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-g8ww-46x2-2p65

Опубликовано: 05 мая 2021
Источник: github
Github: Прошло ревью
CVSS3: 7.5

Описание

Denial of Service in Action Dispatch

Impact

There is a possible Denial of Service vulnerability in Action Dispatch. Carefully crafted Accept headers can cause the mime type parser in Action Dispatch to do catastrophic backtracking in the regular expression engine.

Releases

The fixed releases are available at the normal locations.

Workarounds

The following monkey patch placed in an initializer can be used to work around the issue.

module Mime class Type MIME_REGEXP = /\A(?:\*\/\*|#{MIME_NAME}\/(?:\*|#{MIME_NAME})(?>\s*#{MIME_PARAMETER}\s*)*)\z/ end end

Patches

To aid users who aren't able to upgrade immediately we have provided patches for the two supported release series. They are in git-am format and consist of a single changeset.

  • 6-0-Prevent-catastrophic-backtracking-during-mime-parsin.patch - Patch for 6.0 series
  • 6-1-Prevent-catastrophic-backtracking-during-mime-parsin.patch - Patch for 6.1 series

Please note that only the 6.1.Z, 6.0.Z, and 5.2.Z series are supported at present. Users of earlier unsupported releases are advised to upgrade as soon as possible as we cannot guarantee the continued availability of security fixes for unsupported releases.

Credits

Thanks to Security Curious security...@pm.me for reporting this!

Пакеты

Наименование

actionpack

rubygems
Затронутые версииВерсия исправления

>= 6.0.0, <= 6.0.3.6

6.0.3.7

Наименование

actionpack

rubygems
Затронутые версииВерсия исправления

>= 6.1.0, <= 6.1.3.1

6.1.3.2

EPSS

Процентиль: 77%
0.01063
Низкий

7.5 High

CVSS3

Дефекты

CWE-400

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 4 лет назад

The actionpack ruby gem (a framework for handling and responding to web requests in Rails) before 6.0.3.7, 6.1.3.2 suffers from a possible denial of service vulnerability in the Mime type parser of Action Dispatch. Carefully crafted Accept headers can cause the mime type parser in Action Dispatch to do catastrophic backtracking in the regular expression engine.

CVSS3: 7.5
redhat
почти 5 лет назад

The actionpack ruby gem (a framework for handling and responding to web requests in Rails) before 6.0.3.7, 6.1.3.2 suffers from a possible denial of service vulnerability in the Mime type parser of Action Dispatch. Carefully crafted Accept headers can cause the mime type parser in Action Dispatch to do catastrophic backtracking in the regular expression engine.

CVSS3: 7.5
nvd
больше 4 лет назад

The actionpack ruby gem (a framework for handling and responding to web requests in Rails) before 6.0.3.7, 6.1.3.2 suffers from a possible denial of service vulnerability in the Mime type parser of Action Dispatch. Carefully crafted Accept headers can cause the mime type parser in Action Dispatch to do catastrophic backtracking in the regular expression engine.

CVSS3: 7.5
debian
больше 4 лет назад

The actionpack ruby gem (a framework for handling and responding to we ...

CVSS3: 7.5
fstec
почти 5 лет назад

Уязвимость обработчика регулярных выражений парсера Mime-типа функционала Action Dispatch фреймворка actionpack ruby gem программной платформы Ruby on Rails, связанная с неконтролируемым расходом ресурсов, позволяющая нарушителю вызвать отказ в обслуживании

EPSS

Процентиль: 77%
0.01063
Низкий

7.5 High

CVSS3

Дефекты

CWE-400