Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2020-7663

Опубликовано: 02 июн. 2020
Источник: redhat
CVSS3: 7.5
EPSS Низкий

Описание

websocket-extensions ruby module prior to 0.1.5 allows Denial of Service (DoS) via Regex Backtracking. The extension parser may take quadratic time when parsing a header containing an unclosed string parameter value whose content is a repeating two-byte sequence of a backslash and some other character. This could be abused by an attacker to conduct Regex Denial Of Service (ReDoS) on a single-threaded server by providing a malicious payload with the Sec-WebSocket-Extensions header.

A flaw was found in the websocket-extensions ruby module in versions prior to 0.1.5. The parser may take quadratic time when parsing a header containing an unclosed string parameter value whose content is a repeating two-byte sequence of a backslash and another character. When abused by an attacker, a Regex denial of service on a single-threaded server could occur. The highest threat from this vulnerability is to system availability.

Отчет

Red Hat CloudForms 4.7 (CFME 5.10) is in the maintenance phase and we will not be fixing Medium/Low impact security bugs. Reference: https://access.redhat.com/support/policy/updates/cloudforms Red Hat Satellite 6 ships affected RubyGem Websocket-extensions, however, product is not vulnerable to the flaw. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
CloudForms Management Engine 5cfme-gemsetOut of support scope
Red Hat Satellite 6.8 for RHEL 7ansible-collection-redhat-satelliteFixedRHSA-2020:436627.10.2020
Red Hat Satellite 6.8 for RHEL 7ansiblerole-foreman_scap_clientFixedRHSA-2020:436627.10.2020
Red Hat Satellite 6.8 for RHEL 7ansiblerole-insights-clientFixedRHSA-2020:436627.10.2020
Red Hat Satellite 6.8 for RHEL 7ansiblerole-satellite-receptor-installerFixedRHSA-2020:436627.10.2020
Red Hat Satellite 6.8 for RHEL 7ansible-runnerFixedRHSA-2020:436627.10.2020
Red Hat Satellite 6.8 for RHEL 7candlepinFixedRHSA-2020:436627.10.2020
Red Hat Satellite 6.8 for RHEL 7createrepo_cFixedRHSA-2020:436627.10.2020
Red Hat Satellite 6.8 for RHEL 7foremanFixedRHSA-2020:436627.10.2020
Red Hat Satellite 6.8 for RHEL 7foreman-bootloaders-redhatFixedRHSA-2020:436627.10.2020

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-20->CWE-185->CWE-400
https://bugzilla.redhat.com/show_bug.cgi?id=1845978rubygem-websocket-extensions: ReDoS vulnerability in Sec-WebSocket-Extensions parser

EPSS

Процентиль: 70%
0.00635
Низкий

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
ubuntu
около 5 лет назад

websocket-extensions ruby module prior to 0.1.5 allows Denial of Service (DoS) via Regex Backtracking. The extension parser may take quadratic time when parsing a header containing an unclosed string parameter value whose content is a repeating two-byte sequence of a backslash and some other character. This could be abused by an attacker to conduct Regex Denial Of Service (ReDoS) on a single-threaded server by providing a malicious payload with the Sec-WebSocket-Extensions header.

CVSS3: 7.5
nvd
около 5 лет назад

websocket-extensions ruby module prior to 0.1.5 allows Denial of Service (DoS) via Regex Backtracking. The extension parser may take quadratic time when parsing a header containing an unclosed string parameter value whose content is a repeating two-byte sequence of a backslash and some other character. This could be abused by an attacker to conduct Regex Denial Of Service (ReDoS) on a single-threaded server by providing a malicious payload with the Sec-WebSocket-Extensions header.

CVSS3: 7.5
debian
около 5 лет назад

websocket-extensions ruby module prior to 0.1.5 allows Denial of Servi ...

suse-cvrf
больше 2 лет назад

Security update for rubygem-websocket-extensions

CVSS3: 7.5
redos
28 дней назад

Уязвимость rubygem-websocket-extensions

EPSS

Процентиль: 70%
0.00635
Низкий

7.5 High

CVSS3

Уязвимость CVE-2020-7663