Lucene search

K
cve[email protected]CVE-2024-0241
HistoryJan 04, 2024 - 9:15 p.m.

CVE-2024-0241

2024-01-0421:15:09
CWE-400
CWE-770
web.nvd.nist.gov
14
cve-2024-0241
encoded_id-rails
resource consumption vulnerability
denial of service
http request

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.001 Low

EPSS

Percentile

30.9%

encoded_id-rails versions before 1.0.0.beta2 are affected by an uncontrolled resource consumption vulnerability. A remote and unauthenticated attacker might cause a denial of service condition by sending an HTTP request with an extremely long “id” parameter.

Affected configurations

NVD
Node
diaconouencodedid\Match\rails
OR
diaconouencodedid\Match\rails1.0.0-
OR
diaconouencodedid\Match\rails1.0.0beta1

CNA Affected

[
  {
    "collectionURL": "https://rubygems.org",
    "defaultStatus": "unaffected",
    "packageName": "encoded_id-rails",
    "versions": [
      {
        "lessThan": "1.0.0.beta2",
        "status": "affected",
        "version": "0",
        "versionType": "semver"
      }
    ]
  }
]

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.001 Low

EPSS

Percentile

30.9%