Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2021-32740

Опубликовано: 03 июл. 2021
Источник: redhat
CVSS3: 7.5
EPSS Низкий

Описание

Addressable is an alternative implementation to the URI implementation that is part of Ruby's standard library. An uncontrolled resource consumption vulnerability exists after version 2.3.0 through version 2.7.0. Within the URI template implementation in Addressable, a maliciously crafted template may result in uncontrolled resource consumption, leading to denial of service when matched against a URI. In typical usage, templates would not normally be read from untrusted user input, but nonetheless, no previous security advisory for Addressable has cautioned against doing this. Users of the parsing capabilities in Addressable but not the URI template capabilities are unaffected. The vulnerability is patched in version 2.8.0. As a workaround, only create Template objects from trusted sources that have been validated not to produce catastrophic backtracking.

A resource-consumption vulnerability was found in rubygem addressable, where its URI template implementation could allow an attacker's crafted template to consume resources, resulting in a denial of service. The highest threat from this vulnerability is to system availability.

Отчет

Red Hat CloudForms 5.0 (CFME 5.11) is in the maintenance support phase and we are no longer fixing Moderate/Low severity security bugs. Reference: https://access.redhat.com/support/policy/updates/cloudforms OpenShift 3.11 components are currently in maintenance support phase, hence Moderate/Low severity security bugs are set as Out Of Support Scope (OOSS). Reference: https://access.redhat.com/support/policy/updates/openshift_noncurrent

Меры по смягчению последствий

Create template objects only from trusted sources that have been validated not to produce catastrophic backtracking.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
CloudForms Management Engine 5cfme-gemsetWill not fix
Logging Subsystem for Red Hat OpenShiftopenshift-logging/eventrouter-rhel9Not affected
Red Hat 3scale API Management Platform 23scale-amp-systemWill not fix
Red Hat 3scale API Management Platform 23scale-toolboxAffected
Red Hat 3scale API Management Platform 2systemAffected
Red Hat OpenShift Container Platform 3.11logging-fluentdOut of support scope
Red Hat OpenShift Container Platform 4openshift4/ose-logging-fluentdAffected
Red Hat OpenStack Platform 13 (Queens) Operational Toolsrubygem-addressableOut of support scope
Red Hat Single Sign-On 7rcue-addressableWill not fix
OpenShift Logging 5.2openshift-logging/fluentd-rhel8FixedRHBA-2021:339307.09.2021

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-400
https://bugzilla.redhat.com/show_bug.cgi?id=1979702rubygem-addressable: ReDoS in templates

EPSS

Процентиль: 75%
0.00891
Низкий

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 4 лет назад

Addressable is an alternative implementation to the URI implementation that is part of Ruby's standard library. An uncontrolled resource consumption vulnerability exists after version 2.3.0 through version 2.7.0. Within the URI template implementation in Addressable, a maliciously crafted template may result in uncontrolled resource consumption, leading to denial of service when matched against a URI. In typical usage, templates would not normally be read from untrusted user input, but nonetheless, no previous security advisory for Addressable has cautioned against doing this. Users of the parsing capabilities in Addressable but not the URI template capabilities are unaffected. The vulnerability is patched in version 2.8.0. As a workaround, only create Template objects from trusted sources that have been validated not to produce catastrophic backtracking.

CVSS3: 7.5
nvd
больше 4 лет назад

Addressable is an alternative implementation to the URI implementation that is part of Ruby's standard library. An uncontrolled resource consumption vulnerability exists after version 2.3.0 through version 2.7.0. Within the URI template implementation in Addressable, a maliciously crafted template may result in uncontrolled resource consumption, leading to denial of service when matched against a URI. In typical usage, templates would not normally be read from untrusted user input, but nonetheless, no previous security advisory for Addressable has cautioned against doing this. Users of the parsing capabilities in Addressable but not the URI template capabilities are unaffected. The vulnerability is patched in version 2.8.0. As a workaround, only create Template objects from trusted sources that have been validated not to produce catastrophic backtracking.

CVSS3: 7.5
msrc
больше 4 лет назад

Regular Expression Denial of Service in Addressable templates

CVSS3: 7.5
debian
больше 4 лет назад

Addressable is an alternative implementation to the URI implementation ...

CVSS3: 7.5
github
больше 4 лет назад

Regular Expression Denial of Service in Addressable templates

EPSS

Процентиль: 75%
0.00891
Низкий

7.5 High

CVSS3