First published: Fri Mar 31 2023(Updated: )
A ReDoS issue was discovered in the Time component through 0.2.1 in Ruby through 3.2.1. The Time parser mishandles invalid URLs that have specific characters. It causes an increase in execution time for parsing strings to Time objects. The fixed versions are 0.1.1 and 0.2.2.
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Ruby-lang Ruby | <=2.7.7 | |
Ruby-lang Time | =0.1.0 | |
Ruby-lang Time | =0.2.1 | |
Debian Debian Linux | =10.0 | |
Fedoraproject Fedora | =36 | |
Fedoraproject Fedora | =37 | |
Fedoraproject Fedora | =38 | |
rubygems/time | <0.1.1 | 0.1.1 |
rubygems/time | >=0.2.0<0.2.2 | 0.2.2 |
debian/jruby | <=9.3.9.0+ds-8 | 9.4.8.0+ds-1 |
debian/ruby2.7 | <=2.7.4-1+deb11u1 | 2.7.4-1+deb11u3 |
debian/ruby3.1 | <=3.1.2-7+deb12u1<=3.1.2-8.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-28756 is a ReDoS (Regular Expression Denial of Service) vulnerability discovered in the Time component of Ruby versions up to 3.2.1.
CVE-2023-28756 has a severity rating of 7.5 (high).
CVE-2023-28756 affects the Time component in Ruby versions up to 3.2.1.
To fix CVE-2023-28756, you need to upgrade Ruby to version 0.1.1 or version 0.2.2, depending on the affected package.
You can find more information about CVE-2023-28756 on the official Ruby website.