CVE-2023-22795

CVSS V2 None CVSS V3 None
Description
A regular expression based DoS vulnerability in Action Dispatch <6.1.7.1 and <7.0.4.1 related to the If-None-Match header. A specially crafted HTTP If-None-Match header can cause the regular expression engine to enter a state of catastrophic backtracking, when on a version of Ruby below 3.2.0. This can cause the process to use large amounts of CPU and memory, leading to a possible DoS vulnerability All users running an affected release should either upgrade or use one of the workarounds immediately.
Overview
  • CVE ID
  • CVE-2023-22795
  • Assigner
  • support@hackerone.com
  • Vulnerability Status
  • Analyzed
  • Published Version
  • 2023-02-09T20:15:11
  • Last Modified Date
  • 2023-04-27T18:50:27
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
AND
cpe:2.3:a:actionpack_project:actionpack:*:*:*:*:*:ruby:*:* 1 OR 6.1.7.1
cpe:2.3:a:actionpack_project:actionpack:*:*:*:*:*:ruby:*:* 1 OR 7.0.0 7.0.4.1
cpe:2.3:a:ruby-lang:ruby:*:*:*:*:*:*:*:* 0 OR 3.2.0
AND
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* 1 OR
History
Created Old Value New Value Data Type Notes
2023-04-17 07:28:24 Added to TrackCVE
2023-04-17 07:28:26 Weakness Enumeration new
2023-04-27 19:04:16 2023-04-27T18:50:27 CVE Modified Date updated