Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-61921

Опубликовано: 10 окт. 2025
Источник: redhat
CVSS3: 5.3
EPSS Низкий

Описание

Sinatra is a domain-specific language for creating web applications in Ruby. In versions prior to 4.2.0, there is a denial of service vulnerability in the If-Match and If-None-Match header parsing component of Sinatra, if the etag method is used when constructing the response. Carefully crafted input can cause If-Match and If-None-Match header parsing in Sinatra to take an unexpected amount of time, possibly resulting in a denial of service attack vector. This header is typically involved in generating the ETag header value. Any applications that use the etag method when generating a response are impacted. Version 4.2.0 fixes the issue.

A flaw was found in Sinatra. A Regular Expression Denial of Service (ReDoS) vulnerability can be triggered when parsing the If-Match and If-None-Match HTTP headers. A remote attacker can exploit this issue by sending a specially crafted header to an application endpoint that uses the etag method, causing a excessive CPU consumption and potentially resulting in a denial of service.

Отчет

This flaw can only be exploited in applications using the etag method to generate a response and if they are using Ruby below version 3.2, limiting the exposure of this issue. The most likely security impact of this vulnerability is an unexpected amount of time to parse the If-Match and If-None-Match HTTP headers, potentially resulting in a degraded application performance but not completely deny service to legitimate users. Due to this reason, this flaw has been rated with a moderate severity.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat 3scale API Management Platform 23scale-amp21/zyncWill not fix
Red Hat 3scale API Management Platform 23scale-amp22/zyncWill not fix
Red Hat 3scale API Management Platform 23scale-amp24/zyncWill not fix
Red Hat 3scale API Management Platform 23scale-amp25/zyncWill not fix
Red Hat 3scale API Management Platform 23scale-amp26/zyncWill not fix
Red Hat 3scale API Management Platform 23scale-amp2/zync-rhel7Will not fix
Red Hat 3scale API Management Platform 23scale-amp2/zync-rhel8Will not fix
Red Hat 3scale API Management Platform 23scale-amp2/zync-rhel9Will not fix
Red Hat Enterprise Linux 10pcsNot affected
Red Hat Enterprise Linux 7pcsNot affected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-1333
https://bugzilla.redhat.com/show_bug.cgi?id=2403178sinatra: Sinatra has ReDoS vulnerability in ETag header value generation

EPSS

Процентиль: 60%
0.00397
Низкий

5.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 7.5
ubuntu
6 месяцев назад

Sinatra is a domain-specific language for creating web applications in Ruby. In versions prior to 4.2.0, there is a denial of service vulnerability in the `If-Match` and `If-None-Match` header parsing component of Sinatra, if the `etag` method is used when constructing the response. Carefully crafted input can cause `If-Match` and `If-None-Match` header parsing in Sinatra to take an unexpected amount of time, possibly resulting in a denial of service attack vector. This header is typically involved in generating the `ETag` header value. Any applications that use the `etag` method when generating a response are impacted. Version 4.2.0 fixes the issue.

CVSS3: 7.5
nvd
6 месяцев назад

Sinatra is a domain-specific language for creating web applications in Ruby. In versions prior to 4.2.0, there is a denial of service vulnerability in the `If-Match` and `If-None-Match` header parsing component of Sinatra, if the `etag` method is used when constructing the response. Carefully crafted input can cause `If-Match` and `If-None-Match` header parsing in Sinatra to take an unexpected amount of time, possibly resulting in a denial of service attack vector. This header is typically involved in generating the `ETag` header value. Any applications that use the `etag` method when generating a response are impacted. Version 4.2.0 fixes the issue.

CVSS3: 7.5
debian
6 месяцев назад

Sinatra is a domain-specific language for creating web applications in ...

github
6 месяцев назад

Sinatra is vulnerable to ReDoS through ETag header value generation

CVSS3: 7.5
fstec
6 месяцев назад

Уязвимость парсера фреймворка разработки веб-приложений на Ruby Sinatra, позволяющая нарушителю вызвать отказ в обслуживании

EPSS

Процентиль: 60%
0.00397
Низкий

5.3 Medium

CVSS3