Vulnerability Description
A regular expression based DoS vulnerability in Action Dispatch <6.0.6.1,< 6.1.7.1, and <7.0.4.1. Specially crafted cookies, in combination with a specially crafted X_FORWARDED_HOST header can cause the regular expression engine to enter a state of catastrophic backtracking. This can cause the process to use large amounts of CPU and memory, leading to a possible DoS vulnerability All users running an affected release should either upgrade or use one of the workarounds immediately.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Rubyonrails | Rails | >= 3.0.0, < 6.0.6.1 |
Related Weaknesses (CWE)
References
- https://discuss.rubyonrails.org/t/cve-2023-22792-possible-redos-based-dos-vulnerPatchVendor Advisory
- https://security.netapp.com/advisory/ntap-20240202-0007/
- https://www.debian.org/security/2023/dsa-5372
- https://discuss.rubyonrails.org/t/cve-2023-22792-possible-redos-based-dos-vulnerPatchVendor Advisory
- https://security.netapp.com/advisory/ntap-20240202-0007/
- https://www.debian.org/security/2023/dsa-5372
FAQ
What is CVE-2023-22792?
CVE-2023-22792 is a vulnerability with a CVSS score of 7.5 (HIGH). A regular expression based DoS vulnerability in Action Dispatch <6.0.6.1,< 6.1.7.1, and <7.0.4.1. Specially crafted cookies, in combination with a specially crafted X_FORWARDED_HOST header can cause t...
How severe is CVE-2023-22792?
CVE-2023-22792 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-22792?
Check the references section above for vendor advisories and patch information. Affected products include: Rubyonrails Rails.