CVE-2021-22902

The actionpack ruby gem (a framework for handling and responding to web requests in Rails) before 6.0.3.7, 6.1.3.2 suffers from a possible denial of service vulnerability in the Mime type parser of Action Dispatch. Carefully crafted Accept headers can cause the mime type parser in Action Dispatch to do catastrophic backtracking in the regular expression engine.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:rubyonrails:rails:*:*:*:*:*:*:*:*
cpe:2.3:a:rubyonrails:rails:*:*:*:*:*:*:*:*

History

21 Nov 2024, 05:50

Type Values Removed Values Added
References () https://discuss.rubyonrails.org/t/cve-2021-22902-possible-denial-of-service-vulnerability-in-action-dispatch/77866 - Exploit, Mitigation, Patch, Vendor Advisory () https://discuss.rubyonrails.org/t/cve-2021-22902-possible-denial-of-service-vulnerability-in-action-dispatch/77866 - Exploit, Mitigation, Patch, Vendor Advisory
References () https://hackerone.com/reports/1138654 - Permissions Required, Third Party Advisory () https://hackerone.com/reports/1138654 - Permissions Required, Third Party Advisory

Information

Published : 2021-06-11 16:15

Updated : 2024-11-21 05:50


NVD link : CVE-2021-22902

Mitre link : CVE-2021-22902

CVE.ORG link : CVE-2021-22902


JSON object : View

Products Affected

rubyonrails

  • rails
CWE
CWE-400

Uncontrolled Resource Consumption

NVD-CWE-noinfo