The actionpack ruby gem (a framework for handling and responding to web requests in Rails) before 6.0.3.7, 6.1.3.2 suffers from a possible denial of service vulnerability in the Mime type parser of Action Dispatch. Carefully crafted Accept headers can cause the mime type parser in Action Dispatch to do catastrophic backtracking in the regular expression engine.
References
Link | Resource |
---|---|
https://discuss.rubyonrails.org/t/cve-2021-22902-possible-denial-of-service-vulnerability-in-action-dispatch/77866 | Exploit Mitigation Patch Vendor Advisory |
https://hackerone.com/reports/1138654 | Permissions Required Third Party Advisory |
https://discuss.rubyonrails.org/t/cve-2021-22902-possible-denial-of-service-vulnerability-in-action-dispatch/77866 | Exploit Mitigation Patch Vendor Advisory |
https://hackerone.com/reports/1138654 | Permissions Required Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 05:50
Type | Values Removed | Values Added |
---|---|---|
References | () https://discuss.rubyonrails.org/t/cve-2021-22902-possible-denial-of-service-vulnerability-in-action-dispatch/77866 - Exploit, Mitigation, Patch, Vendor Advisory | |
References | () https://hackerone.com/reports/1138654 - Permissions Required, Third Party Advisory |
Information
Published : 2021-06-11 16:15
Updated : 2024-11-21 05:50
NVD link : CVE-2021-22902
Mitre link : CVE-2021-22902
CVE.ORG link : CVE-2021-22902
JSON object : View
Products Affected
rubyonrails
- rails
CWE