Lucene search

K
githubGitHub Advisory DatabaseGHSA-9J7M-RJQX-48VH
HistoryMay 14, 2022 - 1:08 a.m.

RubyGems Regular Expression Denial of Service vulnerability

2022-05-1401:08:27
CWE-400
GitHub Advisory Database
github.com
19
rubygems
regular expression
denial of service
cpu
vulnerability
gem version
ruby 1.9
ruby 2.0

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:N/A:P

EPSS

0.018

Percentile

88.3%

Algorithmic complexity vulnerability in Gem::Version::VERSION_PATTERN in lib/rubygems/version.rb in RubyGems before 1.8.23.1, 1.8.24 through 1.8.25, 2.0.x before 2.0.8, and 2.1.x before 2.1.0, as used in Ruby 1.9.0 through 2.0.0p247, allows remote attackers to cause a denial of service (CPU consumption) via a crafted gem version that triggers a large amount of backtracking in a regular expression.

Affected configurations

Vulners
Node
rubygemsrubygems-updateRange2.1.0.rc.12.1.0
OR
rubygemsrubygems-updateRange2.0.02.0.8
OR
rubygemsrubygems-updateRange1.8.241.8.26
OR
rubygemsrubygems-updateRange<1.8.23.1
VendorProductVersionCPE
rubygemsrubygems-update*cpe:2.3:a:rubygems:rubygems-update:*:*:*:*:*:*:*:*

References

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:N/A:P

EPSS

0.018

Percentile

88.3%