Vulnerability CVE-2023-22795: Information

Description

A regular expression based DoS vulnerability in Action Dispatch <6.1.7.1 and <7.0.4.1 related to the If-None-Match header. A specially crafted HTTP If-None-Match header can cause the regular expression engine to enter a state of catastrophic backtracking, when on a version of Ruby below 3.2.0. This can cause the process to use large amounts of CPU and memory, leading to a possible DoS vulnerability All users running an affected release should either upgrade or use one of the workarounds immediately.

Severity: HIGH (7.5) Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Published: Feb. 9, 2023
Modified: Feb. 2, 2024
Error type identifier: CWE-1333

Fixed packages

Package name
Branch
Fixed in version
Version from repository
Errata ID
Task #
State
gem-railssisyphus6.1.7.1-alt16.1.7.7-alt1ALT-PU-2023-1336-1313736Fixed
gem-railssisyphus_riscv646.1.7.1-alt1.16.1.7.1-alt1.2ALT-PU-2023-2733-1-Fixed
gem-railsp106.1.7.1-alt1.16.1.7.1-alt1.2ALT-PU-2023-4268-4307833Fixed
gem-railsc10f16.1.7.1-alt1.25.2.4.4-alt2ALT-PU-2024-7814-2334397Testing
gem-railsp116.1.7.1-alt16.1.7.7-alt1ALT-PU-2023-1336-1313736Fixed

References to Advisories, Solutions, and Tools

    1. Configuration 1

      cpe:2.3:a:rubyonrails:rails:*:*:*:*:*:*:*:*

      cpe:2.3:a:rubyonrails:rails:*:*:*:*:*:*:*:*

      Running on/with:
      cpe:2.3:a:ruby-lang:ruby:*:*:*:*:*:*:*:*

      Configuration 2

      cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*