Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2023-22796

Опубликовано: 20 янв. 2023
Источник: redhat
CVSS3: 7.5
EPSS Низкий

Описание

A regular expression based DoS vulnerability in Active Support <6.1.7.1 and <7.0.4.1. A specially crafted string passed to the underscore method can cause the regular expression engine to enter a state of catastrophic backtracking. This can cause the process to use large amounts of CPU and memory, leading to a possible DoS vulnerability.

A flaw was found in rubygem-activesupport. RubyGem's activesupport gem is vulnerable to a denial of service caused by a regular expression denial of service (ReDoS) flaw in Inflector.underscore. By sending a specially-crafted regex input, a remote attacker can use large amounts of CPU and memory, resulting in a denial of service.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat 3scale API Management Platform 23scale-amp-backend-containerAffected
Red Hat Satellite 6candlepinNot affected
Red Hat Satellite 6.14 for RHEL 8rubygem-activesupportFixedRHSA-2023:681808.11.2023
RHOL-5.7-RHEL-8openshift-logging/fluentd-rhel8FixedRHSA-2023:434102.08.2023

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-1333
https://bugzilla.redhat.com/show_bug.cgi?id=2164736rubygem-activesupport: Regular Expression Denial of Service

EPSS

Процентиль: 78%
0.01149
Низкий

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 2 лет назад

A regular expression based DoS vulnerability in Active Support <6.1.7.1 and <7.0.4.1. A specially crafted string passed to the underscore method can cause the regular expression engine to enter a state of catastrophic backtracking. This can cause the process to use large amounts of CPU and memory, leading to a possible DoS vulnerability.

CVSS3: 7.5
nvd
больше 2 лет назад

A regular expression based DoS vulnerability in Active Support <6.1.7.1 and <7.0.4.1. A specially crafted string passed to the underscore method can cause the regular expression engine to enter a state of catastrophic backtracking. This can cause the process to use large amounts of CPU and memory, leading to a possible DoS vulnerability.

CVSS3: 7.5
debian
больше 2 лет назад

A regular expression based DoS vulnerability in Active Support <6.1.7. ...

suse-cvrf
больше 2 лет назад

Security update for rubygem-activesupport-5_1

CVSS3: 7.5
redos
5 месяцев назад

Уязвимость rubygem-activesupport

EPSS

Процентиль: 78%
0.01149
Низкий

7.5 High

CVSS3