Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-27219

Опубликовано: 03 мар. 2025
Источник: redhat
CVSS3: 5.3

Описание

In the CGI gem before 0.4.2 for Ruby, the CGI::Cookie.parse method in the CGI library contains a potential Denial of Service (DoS) vulnerability. The method does not impose any limit on the length of the raw cookie value it processes. This oversight can lead to excessive resource consumption when parsing extremely large cookies.

A flaw was found in Ruby's CGI gem. Processing specially crafted large cookies with the CGI::Cookie.parse method can cause excessive resource consumption due to a missing limit on the length of the raw cookie value, resulting in a denial of service.

Отчет

This issue will cause an excessive resource consumption, potentially resulting in a bad application performance. However, an attacker does have the ability to completely deny service to legitimate users. For this reason, this vulnerability has been rated with a moderate severity. Within regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-770: Allocation of Resources Without Limits or Throttling vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low. The platform enforces hardening guidelines to apply the most restrictive settings required for operations, while baseline configurations maintain secure system and software states. A defense-in-depth monitoring strategy includes perimeter firewalls and endpoint protection services that detect excessive resource usage caused by malicious activity or system misconfigurations. In the event of exploitation, process isolation ensures workloads operate in separate environments, preventing any single process from overconsuming CPU or memory and degrading system performance.

Меры по смягчению последствий

Do not process large cookies or strings with the CGI::Cookie.parse method from the CGI library. Adding a check to verify and limit the length of the cookie or string before processing it will mitigate this vulnerability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6rubyOut of support scope
Red Hat Enterprise Linux 7rubyOut of support scope
Red Hat Enterprise Linux 8ruby:2.5/rubyOut of support scope
Red Hat Enterprise Linux 8ruby:3.3/rubyOut of support scope
Red Hat Enterprise Linux 10rubyFixedRHSA-2025:813126.05.2025
Red Hat Enterprise Linux 8rubyFixedRHSA-2025:406323.04.2025
Red Hat Enterprise Linux 9rubyFixedRHSA-2025:448706.05.2025
Red Hat Enterprise Linux 9rubyFixedRHSA-2025:448806.05.2025
Red Hat Enterprise Linux 9rubyFixedRHSA-2025:449306.05.2025

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-770
https://bugzilla.redhat.com/show_bug.cgi?id=2349699CGI: Denial of Service in CGI::Cookie.parse

5.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.8
ubuntu
4 месяца назад

In the CGI gem before 0.4.2 for Ruby, the CGI::Cookie.parse method in the CGI library contains a potential Denial of Service (DoS) vulnerability. The method does not impose any limit on the length of the raw cookie value it processes. This oversight can lead to excessive resource consumption when parsing extremely large cookies.

CVSS3: 5.8
nvd
4 месяца назад

In the CGI gem before 0.4.2 for Ruby, the CGI::Cookie.parse method in the CGI library contains a potential Denial of Service (DoS) vulnerability. The method does not impose any limit on the length of the raw cookie value it processes. This oversight can lead to excessive resource consumption when parsing extremely large cookies.

CVSS3: 7.5
msrc
3 месяца назад

Описание отсутствует

CVSS3: 5.8
debian
4 месяца назад

In the CGI gem before 0.4.2 for Ruby, the CGI::Cookie.parse method in ...

CVSS3: 5.8
github
4 месяца назад

CGI has Denial of Service (DoS) potential in Cookie.parse

5.3 Medium

CVSS3