Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2023-22795

Опубликовано: 09 фев. 2023
Источник: nvd
CVSS3: 7.5
EPSS Низкий

Описание

A regular expression based DoS vulnerability in Action Dispatch <6.1.7.1 and <7.0.4.1 related to the If-None-Match header. A specially crafted HTTP If-None-Match header can cause the regular expression engine to enter a state of catastrophic backtracking, when on a version of Ruby below 3.2.0. This can cause the process to use large amounts of CPU and memory, leading to a possible DoS vulnerability All users running an affected release should either upgrade or use one of the workarounds immediately.

Уязвимые конфигурации

Конфигурация 1

Одновременно

Одно из

cpe:2.3:a:rubyonrails:rails:*:*:*:*:*:*:*:*
Версия до 6.1.7.1 (исключая)
cpe:2.3:a:rubyonrails:rails:*:*:*:*:*:*:*:*
Версия от 7.0.0 (включая) до 7.0.4.1 (исключая)
cpe:2.3:a:ruby-lang:ruby:*:*:*:*:*:*:*:*
Версия до 3.2.0 (исключая)
Конфигурация 2
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

EPSS

Процентиль: 72%
0.00757
Низкий

7.5 High

CVSS3

Дефекты

CWE-400
CWE-1333

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 2 лет назад

A regular expression based DoS vulnerability in Action Dispatch <6.1.7.1 and <7.0.4.1 related to the If-None-Match header. A specially crafted HTTP If-None-Match header can cause the regular expression engine to enter a state of catastrophic backtracking, when on a version of Ruby below 3.2.0. This can cause the process to use large amounts of CPU and memory, leading to a possible DoS vulnerability All users running an affected release should either upgrade or use one of the workarounds immediately.

CVSS3: 7.5
redhat
больше 2 лет назад

A regular expression based DoS vulnerability in Action Dispatch <6.1.7.1 and <7.0.4.1 related to the If-None-Match header. A specially crafted HTTP If-None-Match header can cause the regular expression engine to enter a state of catastrophic backtracking, when on a version of Ruby below 3.2.0. This can cause the process to use large amounts of CPU and memory, leading to a possible DoS vulnerability All users running an affected release should either upgrade or use one of the workarounds immediately.

CVSS3: 7.5
msrc
больше 2 лет назад

Описание отсутствует

CVSS3: 7.5
debian
больше 2 лет назад

A regular expression based DoS vulnerability in Action Dispatch <6.1.7 ...

github
больше 2 лет назад

ReDoS based DoS vulnerability in Action Dispatch

EPSS

Процентиль: 72%
0.00757
Низкий

7.5 High

CVSS3

Дефекты

CWE-400
CWE-1333