The PostgreSQL adapter in Active Record before 6.1.2.1, 6.0.3.5, 5.2.4.5 suffers from a regular expression denial of service (REDoS) vulnerability. Carefully crafted input can cause the input validation in the `money` type of the PostgreSQL adapter in Active Record to spend too much time in a regular expression, resulting in the potential for a DoS attack. This only impacts Rails applications that are using PostgreSQL along with money type columns that take user input.
References
Link | Resource |
---|---|
https://discuss.rubyonrails.org/t/cve-2021-22880-possible-dos-vulnerability-in-active-record-postgresql-adapter/77129 | Mitigation Patch Vendor Advisory |
https://hackerone.com/reports/1023899 | Exploit Patch Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MO5OJ3F4ZL3UXVLJO6ECANRVZBNRS2IH/ | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XQ3NS4IBYE2I3MVMGAHFZBZBIZGHXHT3/ | |
https://security.netapp.com/advisory/ntap-20210805-0009/ | Third Party Advisory |
https://www.debian.org/security/2021/dsa-4929 | Third Party Advisory |
Configurations
History
07 Nov 2023, 03:30
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2021-02-11 18:15
Updated : 2024-02-28 18:08
NVD link : CVE-2021-22880
Mitre link : CVE-2021-22880
CVE.ORG link : CVE-2021-22880
JSON object : View
Products Affected
fedoraproject
- fedora
rubyonrails
- rails
CWE
CWE-400
Uncontrolled Resource Consumption