Lucene search

K
rubygemsRubySecRUBY:FUGIT-2024-43380
HistoryAug 18, 2024 - 9:00 p.m.

fugit parse and parse_nat stall on lengthy input

2024-08-1821:00:00
RubySec
github.com
3
fugit
natural
parser
input
thread
impact
fix
release
rubygems
workarounds
plausability

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

AI Score

7.1

Confidence

Low

Impact

The fugit “natural” parser, that turns “every wednesday at 5pm” into
“0 17 * * 3”, accepted any length of input and went on attempting to
parse it, not returning promptly, as expected. The parse call could
hold the thread with no end in sight.

Fugit dependents that do not check (user) input length for
plausability are impacted.

Patches

Problem was reported in #104 and the fix was released in
fugit 1.11.1

Workarounds

By making sure that Fugit.parse(s), Fugit.do_parse(s),
Fugit.parse_nat(s), Fugit.do_parse_nat(s), Fugit::Nat.parse(s),
and Fugit::Nat.do_parse(s) are not fed strings too long.
1000 chars feels ok, while 10_000 chars makes it stall.

In fewer words, making sure those fugit methods are not fed
unvetted input strings.

Affected configurations

Vulners
Node
rubyfugitRange1.11.1
VendorProductVersionCPE
rubyfugit*cpe:2.3:a:ruby:fugit:*:*:*:*:*:*:*:*

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

AI Score

7.1

Confidence

Low