First published: Wed May 05 2021(Updated: )
A flaw was found in RubyGem Actionpack which is framework for handling and responding to web requests in Rails. A possible Denial of Service vulnerability was found in the Mime type parser of Action Dispatch.
Credit: support@hackerone.com support@hackerone.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/tfm-rubygem-rails | <0:6.0.3.7-1.el7 | 0:6.0.3.7-1.el7 |
rubygems/actionpack | >=6.1.0<=6.1.3.1 | 6.1.3.2 |
rubygems/actionpack | >=6.0.0<=6.0.3.6 | 6.0.3.7 |
Rubyonrails Rails | >=6.0.0<6.0.3.7 | |
Rubyonrails Rails | >=6.1.0<6.1.0.2 | |
debian/rails | 2:5.2.2.1+dfsg-1+deb10u3 2:5.2.2.1+dfsg-1+deb10u5 2:6.0.3.7+dfsg-2+deb11u2 2:6.1.7.3+dfsg-1 2:6.1.7.3+dfsg-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-22902 is a Denial of Service vulnerability in Action Dispatch, a component of RubyGem Actionpack.
The vulnerability in CVE-2021-22902 can lead to a Denial of Service attack by causing catastrophic backtracking in the mime type parser.
CVE-2021-22902 has a severity rating of 7.5 (High).
Actionpack versions 6.1.0 to 6.1.3.1 and 6.0.0 to 6.0.3.6 are affected by CVE-2021-22902.
To fix CVE-2021-22902, update your Actionpack to version 6.1.3.2 or 6.0.3.7.