Denial of Service Vulnerability in websocket-extensions Ruby Module by Faye
CVE-2020-7663

7.5HIGH

What is CVE-2020-7663?

The websocket-extensions Ruby module before version 0.1.5 is susceptible to a Denial of Service attack due to a Regex Backtracking vulnerability. This flaw occurs when an unclosed string parameter value within a header, containing a repetitive two-byte backslash sequence, is parsed. An attacker can exploit this by sending a specially crafted payload with the Sec-WebSocket-Extensions header, potentially causing the server to enter a state of high resource consumption, leading to service disruption. This vulnerability highlights the importance of proper input validation and the need for timely security updates.

Affected Version(s)

websocket-extensions (ruby) All versions prior to 0.1.5

References

CVSS V3.1

Score:
7.5
Severity:
HIGH
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.