Denial of Service Vulnerability in websocket-extensions Ruby Module by Faye
CVE-2020-7663
Key Information:
- Vendor
Websocket-extensions Project
- Vendor
- CVE Published:
- 2 June 2020
What is CVE-2020-7663?
The websocket-extensions Ruby module before version 0.1.5 is susceptible to a Denial of Service attack due to a Regex Backtracking vulnerability. This flaw occurs when an unclosed string parameter value within a header, containing a repetitive two-byte backslash sequence, is parsed. An attacker can exploit this by sending a specially crafted payload with the Sec-WebSocket-Extensions header, potentially causing the server to enter a state of high resource consumption, leading to service disruption. This vulnerability highlights the importance of proper input validation and the need for timely security updates.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
websocket-extensions (ruby) All versions prior to 0.1.5
References
CVSS V3.1
Timeline
Vulnerability published
Vulnerability Reserved
