First published: Thu Jan 26 2023(Updated: )
A regular expression based DoS vulnerability in Action Dispatch <6.1.7.1 and <7.0.4.1 related to the If-None-Match header. A specially crafted HTTP If-None-Match header can cause the regular expression engine to enter a state of catastrophic backtracking, when on a version of Ruby below 3.2.0. This can cause the process to use large amounts of CPU and memory, leading to a possible DoS vulnerability All users running an affected release should either upgrade or use one of the workarounds immediately.
Credit: support@hackerone.com support@hackerone.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/rails | <=2:5.2.2.1+dfsg-1+deb10u3<=2:5.2.2.1+dfsg-1+deb10u5 | 2:6.0.3.7+dfsg-2+deb11u2 2:6.1.7.3+dfsg-1 2:6.1.7.3+dfsg-2 |
Rubyonrails Rails | <6.1.7.1 | |
Rubyonrails Rails | >=7.0.0<7.0.4.1 | |
Ruby-lang Ruby | <3.2.0 | |
Debian Debian Linux | =11.0 | |
redhat/rubygem-actionpack | <6.1.7.1 | 6.1.7.1 |
redhat/rubygem-actionpack | <7.0.4.1 | 7.0.4.1 |
All of | ||
Any of | ||
Rubyonrails Rails | <6.1.7.1 | |
Rubyonrails Rails | >=7.0.0<7.0.4.1 | |
Ruby-lang Ruby | <3.2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-22795 is a regular expression based Denial of Service (DoS) vulnerability in Action Dispatch.
Action Dispatch versions <6.1.7.1 and <7.0.4.1 are affected by CVE-2023-22795.
CVE-2023-22795 is related to the If-None-Match header.
CVE-2023-22795 can be exploited by sending a specially crafted HTTP If-None-Match header.
To mitigate CVE-2023-22795, upgrade to a version of Action Dispatch that is not vulnerable (>=6.1.7.1 or >=7.0.4.1).