The actionpack ruby gem (a framework for handling and responding to web requests in Rails) before 6.0.3.7, 6.1.3.2 suffers from a possible denial of service vulnerability in the Mime type parser of Action Dispatch. Carefully crafted Accept headers can cause the mime type parser in Action Dispatch to do catastrophic backtracking in the regular expression engine.
References
Link | Resource |
---|---|
https://discuss.rubyonrails.org/t/cve-2021-22902-possible-denial-of-service-vulnerability-in-action-dispatch/77866 | Exploit Mitigation Patch Vendor Advisory |
https://hackerone.com/reports/1138654 | Permissions Required Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2021-06-11 16:15
Updated : 2024-02-28 18:28
NVD link : CVE-2021-22902
Mitre link : CVE-2021-22902
CVE.ORG link : CVE-2021-22902
JSON object : View
Products Affected
rubyonrails
- rails
CWE