First published: Wed Jan 18 2023(Updated: )
A regular expression based DoS vulnerability in Action Dispatch <6.0.6.1,< 6.1.7.1, and <7.0.4.1. Specially crafted cookies, in combination with a specially crafted X_FORWARDED_HOST header can cause the regular expression engine to enter a state of catastrophic backtracking. This can cause the process to use large amounts of CPU and memory, leading to a possible DoS vulnerability All users running an affected release should either upgrade or use one of the workarounds immediately.
Credit: support@hackerone.com support@hackerone.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/rails | <=2:5.2.2.1+dfsg-1+deb10u3<=2:5.2.2.1+dfsg-1+deb10u5 | 2:6.0.3.7+dfsg-2+deb11u2 2:6.1.7.3+dfsg-1 2:6.1.7.3+dfsg-2 |
Rubyonrails Rails | >=3.0.0<6.0.6.1 | |
Rubyonrails Rails | >=6.1.0<6.1.7.1 | |
Rubyonrails Rails | >=7.0.0<7.0.4.1 | |
redhat/rubygem-actionpack | <6.1.7.1 | 6.1.7.1 |
redhat/rubygem-actionpack | <7.0.4.1 | 7.0.4.1 |
rubygems/actionpack | >=6.0.0<6.1.7.1 | 6.1.7.1 |
rubygems/actionpack | >=7.0.0<7.0.4.1 | 7.0.4.1 |
rubygems/actionpack | >=3.0.0<5.2.8.15 | 5.2.8.15 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-22792 is a regular expression based DoS vulnerability in Action Dispatch <6.0.6.1, <6.1.7.1, and <7.0.4.1.
CVE-2023-22792 exploits a vulnerability in the regular expression engine of Action Dispatch, which can be triggered by specially crafted cookies and a specially crafted X_FORWARDED_HOST header, causing the engine to enter a state of catastrophic backtracking and potentially leading to a denial-of-service condition.
CVE-2023-22792 affects Action Dispatch versions <6.0.6.1, <6.1.7.1, and <7.0.4.1.
To fix CVE-2023-22792, update your Rails framework to versions 6.0.6.1, 6.1.7.1, or 7.0.4.1 or later.
You can find more information about CVE-2023-22792 at the following references: [1](https://discuss.rubyonrails.org/t/cve-2023-22792-possible-redos-based-dos-vulnerability-in-action-dispatch/82115), [2](https://github.com/rails/rails/commit/7a7f37f146aa977350cf914eba20a95ce371485f), [3](https://security-tracker.debian.org/tracker/CVE-2023-22792).