Lucene search

K
cvelistHackeroneCVELIST:CVE-2023-22795
HistoryFeb 09, 2023 - 12:00 a.m.

CVE-2023-22795

2023-02-0900:00:00
CWE-400
hackerone
www.cve.org
cve-2023-22795
regular expression
dos vulnerability
action dispatch
if-none-match
header
http
ruby
cpu
memory
upgrade
workarounds

7.7 High

AI Score

Confidence

High

0.019 Low

EPSS

Percentile

88.7%

A regular expression based DoS vulnerability in Action Dispatch <6.1.7.1 and <7.0.4.1 related to the If-None-Match header. A specially crafted HTTP If-None-Match header can cause the regular expression engine to enter a state of catastrophic backtracking, when on a version of Ruby below 3.2.0. This can cause the process to use large amounts of CPU and memory, leading to a possible DoS vulnerability All users running an affected release should either upgrade or use one of the workarounds immediately.

CNA Affected

[
  {
    "vendor": "n/a",
    "product": "https://github.com/rails/rails",
    "versions": [
      {
        "version": "6.1.7.1, 7.0.4.1",
        "status": "affected"
      }
    ]
  }
]