Regular Expression DoS Vulnerability in Action Dispatch by Ruby on Rails
CVE-2023-22792

7.5HIGH

Key Information:

Vendor
CVE Published:
9 February 2023

What is CVE-2023-22792?

A Denial of Service (DoS) vulnerability has been identified in Action Dispatch affecting various versions of Ruby on Rails. This flaw arises from the handling of specially crafted cookies in conjunction with a modified X_FORWARDED_HOST header, leading to catastrophic backtracking within the regular expression engine. When exploited, an attacker can significantly degrade the performance of the affected system by causing excessive CPU and memory usage, resulting in service interruptions. Users of any susceptible version are strongly advised to upgrade to the latest release or implement recommended workarounds to mitigate this vulnerability.

Affected Version(s)

https://github.com/rails/rails 6.0.6.1, 6.1.7.1, 7.0.4.1

References

CVSS V3.1

Score:
7.5
Severity:
HIGH
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.
CVE-2023-22792 : Regular Expression DoS Vulnerability in Action Dispatch by Ruby on Rails