Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2023-22792

Опубликовано: 09 фев. 2023
Источник: nvd
CVSS3: 7.5
EPSS Низкий

Описание

A regular expression based DoS vulnerability in Action Dispatch <6.0.6.1,< 6.1.7.1, and <7.0.4.1. Specially crafted cookies, in combination with a specially crafted X_FORWARDED_HOST header can cause the regular expression engine to enter a state of catastrophic backtracking. This can cause the process to use large amounts of CPU and memory, leading to a possible DoS vulnerability All users running an affected release should either upgrade or use one of the workarounds immediately.

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:rubyonrails:rails:*:*:*:*:*:*:*:*
Версия от 3.0.0 (включая) до 6.0.6.1 (исключая)
cpe:2.3:a:rubyonrails:rails:*:*:*:*:*:*:*:*
Версия от 6.1.0 (включая) до 6.1.7.1 (исключая)
cpe:2.3:a:rubyonrails:rails:*:*:*:*:*:*:*:*
Версия от 7.0.0 (включая) до 7.0.4.1 (исключая)

EPSS

Процентиль: 82%
0.01818
Низкий

7.5 High

CVSS3

Дефекты

CWE-400
CWE-1333

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 2 лет назад

A regular expression based DoS vulnerability in Action Dispatch <6.0.6.1,< 6.1.7.1, and <7.0.4.1. Specially crafted cookies, in combination with a specially crafted X_FORWARDED_HOST header can cause the regular expression engine to enter a state of catastrophic backtracking. This can cause the process to use large amounts of CPU and memory, leading to a possible DoS vulnerability All users running an affected release should either upgrade or use one of the workarounds immediately.

CVSS3: 7.5
redhat
больше 2 лет назад

A regular expression based DoS vulnerability in Action Dispatch <6.0.6.1,< 6.1.7.1, and <7.0.4.1. Specially crafted cookies, in combination with a specially crafted X_FORWARDED_HOST header can cause the regular expression engine to enter a state of catastrophic backtracking. This can cause the process to use large amounts of CPU and memory, leading to a possible DoS vulnerability All users running an affected release should either upgrade or use one of the workarounds immediately.

CVSS3: 7.5
debian
больше 2 лет назад

A regular expression based DoS vulnerability in Action Dispatch <6.0.6 ...

github
больше 2 лет назад

ReDoS based DoS vulnerability in Action Dispatch

CVSS3: 7.5
fstec
больше 2 лет назад

Уязвимость компонента Action Dispatch программной платформы Ruby on Rails, позволяющая нарушителю вызвать отказ в обслуживании

EPSS

Процентиль: 82%
0.01818
Низкий

7.5 High

CVSS3

Дефекты

CWE-400
CWE-1333