Lucene search

K
gitlabHttps://gitlab.com/gitlab-org/security-products/gemnasium-dbGITLAB-16037E97F25332E6129048CD9045E613
HistoryFeb 09, 2023 - 12:00 a.m.

Inefficient Regular Expression Complexity

2023-02-0900:00:00
https://gitlab.com/gitlab-org/security-products/gemnasium-db
gitlab.com
14
vulnerability
regular expression
dos
active support

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

EPSS

0.001

Percentile

49.8%

A regular expression based DoS vulnerability in Active Support <6.1.7.1 and <7.0.4.1. A specially crafted string passed to the underscore method can cause the regular expression engine to enter a state of catastrophic backtracking. This can cause the process to use large amounts of CPU and memory, leading to a possible DoS vulnerability.

Affected configurations

Vulners
Node
gemactivesupportRange<6.1.7.1
OR
gemactivesupportRange7.0.0β‰₯
OR
gemactivesupportRange<7.0.4.1
VendorProductVersionCPE
gemactivesupport*cpe:2.3:a:gem:activesupport:*:*:*:*:*:*:*:*

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

EPSS

0.001

Percentile

49.8%