First published: Tue Oct 01 2019(Updated: )
WEBrick::HTTPAuth::DigestAuth in Ruby through 2.4.7, 2.5.x through 2.5.6, and 2.6.x through 2.6.4 has a regular expression Denial of Service cause by looping/backtracking. A victim must expose a WEBrick server that uses DigestAuth to the Internet or a untrusted network.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/rh-ruby25-ruby | <0:2.5.9-9.el7 | 0:2.5.9-9.el7 |
redhat/rh-ruby26-ruby | <0:2.6.7-119.el7 | 0:2.6.7-119.el7 |
redhat/ruby | <2.4.8 | 2.4.8 |
redhat/ruby | <2.5.7 | 2.5.7 |
redhat/ruby | <2.6.5 | 2.6.5 |
redhat/ruby | <2.7.0 | 2.7.0 |
ubuntu/jruby | <1.5.6-9+ | 1.5.6-9+ |
ubuntu/ruby2.3 | <2.3.1-2~ubuntu16.04.14 | 2.3.1-2~ubuntu16.04.14 |
ubuntu/ruby2.5 | <2.5.1-1ubuntu1.6 | 2.5.1-1ubuntu1.6 |
ubuntu/ruby2.5 | <2.5.5-1ubuntu1.1 | 2.5.5-1ubuntu1.1 |
ubuntu/ruby2.5 | <2.5.5-4ubuntu2.1 | 2.5.5-4ubuntu2.1 |
ubuntu/ruby2.5 | <2.5.7-1 | 2.5.7-1 |
debian/jruby | 9.3.9.0+ds-8 9.4.8.0+ds-1 | |
ruby-lang Ruby | >=2.4.0<=2.4.7 | |
ruby-lang Ruby | >=2.5.0<=2.5.6 | |
ruby-lang Ruby | >=2.6.0<=2.6.4 | |
Debian | =8.0 | |
Debian Debian Linux | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2019-16201 is a vulnerability in Ruby's WEBrick::HTTPAuth::DigestAuth that can cause denial of service through looping/backtracking.
CVE-2019-16201 is classified as a high severity vulnerability.
Versions 2.4.7 to 2.4.8, 2.5.x to 2.5.7, and 2.6.x to 2.6.5 of Ruby are affected by CVE-2019-16201.
To fix CVE-2019-16201, update Ruby to version 2.5.9 or later for Ruby 2.5.x, and version 2.6.6 or later for Ruby 2.6.x.
You can find more information about CVE-2019-16201 on the CVE website, NVD, and the official Ruby website.