CVE-2019-5419

There is a possible denial of service vulnerability in Action View (Rails) <5.2.2.1, <5.1.6.2, <5.0.7.2, <4.2.11.1 where specially crafted accept headers can cause action view to consume 100% cpu and make the server unresponsive.
References
Link Resource
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00011.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00025.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00001.html Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2019/03/22/1 Exploit Mailing List Mitigation Patch Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:0796 Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:1147 Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:1149 Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:1289 Third Party Advisory
https://groups.google.com/forum/#%21topic/rubyonrails-security/GN7w9fFAQeI
https://lists.debian.org/debian-lts-announce/2019/03/msg00042.html Mailing List Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Y43636TH4D6T46IC6N2RQVJTRFJAAYGA/
https://weblog.rubyonrails.org/2019/3/13/Rails-4-2-5-1-5-1-6-2-have-been-released/ Patch Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00011.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00025.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00001.html Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2019/03/22/1 Exploit Mailing List Mitigation Patch Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:0796 Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:1147 Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:1149 Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:1289 Third Party Advisory
https://groups.google.com/forum/#%21topic/rubyonrails-security/GN7w9fFAQeI
https://lists.debian.org/debian-lts-announce/2019/03/msg00042.html Mailing List Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Y43636TH4D6T46IC6N2RQVJTRFJAAYGA/
https://weblog.rubyonrails.org/2019/3/13/Rails-4-2-5-1-5-1-6-2-have-been-released/ Patch Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:rubyonrails:rails:*:*:*:*:*:*:*:*
cpe:2.3:a:rubyonrails:rails:*:*:*:*:*:*:*:*
cpe:2.3:a:rubyonrails:rails:*:*:*:*:*:*:*:*
cpe:2.3:a:rubyonrails:rails:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:a:redhat:cloudforms:4.6:*:*:*:*:*:*:*
cpe:2.3:a:redhat:cloudforms:4.7:*:*:*:*:*:*:*
cpe:2.3:a:redhat:software_collections:1.0:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*

Configuration 5 (hide)

cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*

History

21 Nov 2024, 04:44

Type Values Removed Values Added
References () http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00011.html - Mailing List, Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00011.html - Mailing List, Third Party Advisory
References () http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00025.html - Mailing List, Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00025.html - Mailing List, Third Party Advisory
References () http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00001.html - Mailing List, Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00001.html - Mailing List, Third Party Advisory
References () http://www.openwall.com/lists/oss-security/2019/03/22/1 - Exploit, Mailing List, Mitigation, Patch, Third Party Advisory () http://www.openwall.com/lists/oss-security/2019/03/22/1 - Exploit, Mailing List, Mitigation, Patch, Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2019:0796 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2019:0796 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2019:1147 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2019:1147 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2019:1149 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2019:1149 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2019:1289 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2019:1289 - Third Party Advisory
References () https://groups.google.com/forum/#%21topic/rubyonrails-security/GN7w9fFAQeI - () https://groups.google.com/forum/#%21topic/rubyonrails-security/GN7w9fFAQeI -
References () https://lists.debian.org/debian-lts-announce/2019/03/msg00042.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2019/03/msg00042.html - Mailing List, Third Party Advisory
References () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Y43636TH4D6T46IC6N2RQVJTRFJAAYGA/ - () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Y43636TH4D6T46IC6N2RQVJTRFJAAYGA/ -
References () https://weblog.rubyonrails.org/2019/3/13/Rails-4-2-5-1-5-1-6-2-have-been-released/ - Patch, Third Party Advisory () https://weblog.rubyonrails.org/2019/3/13/Rails-4-2-5-1-5-1-6-2-have-been-released/ - Patch, Third Party Advisory

07 Nov 2023, 03:11

Type Values Removed Values Added
References
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y43636TH4D6T46IC6N2RQVJTRFJAAYGA/', 'name': 'FEDORA-2019-1cfe24db5c', 'tags': ['Mailing List', 'Third Party Advisory'], 'refsource': 'FEDORA'}
  • {'url': 'https://groups.google.com/forum/#!topic/rubyonrails-security/GN7w9fFAQeI', 'name': 'https://groups.google.com/forum/#!topic/rubyonrails-security/GN7w9fFAQeI', 'tags': ['Exploit', 'Patch', 'Third Party Advisory'], 'refsource': 'CONFIRM'}
  • () https://groups.google.com/forum/#%21topic/rubyonrails-security/GN7w9fFAQeI -
  • () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Y43636TH4D6T46IC6N2RQVJTRFJAAYGA/ -

Information

Published : 2019-03-27 14:29

Updated : 2024-11-21 04:44


NVD link : CVE-2019-5419

Mitre link : CVE-2019-5419

CVE.ORG link : CVE-2019-5419


JSON object : View

Products Affected

redhat

  • cloudforms
  • software_collections

opensuse

  • leap

rubyonrails

  • rails

fedoraproject

  • fedora

debian

  • debian_linux
CWE
CWE-400

Uncontrolled Resource Consumption

CWE-770

Allocation of Resources Without Limits or Throttling