Lucene search

K
rubygemsRubySecRUBY:USER_AGENT_PARSER-2020-5243
HistoryMar 09, 2020 - 9:00 p.m.

Denial of Service in uap-core when processing crafted User-Agent strings

2020-03-0921:00:00
RubySec
github.com
9

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Impact

Some regexes are vulnerable to regular expression denial of service (REDoS) due to
overlapping capture groups. This allows remote attackers to overload a server by
setting the User-Agent header in an HTTP(S) request to maliciously crafted long
strings.

Patches

Please update uap-ruby to >= v2.6.0

For more information

https://github.com/ua-parser/uap-core/security/advisories/GHSA-cmcx-xhr8-3w9p

Affected configurations

Vulners
Node
rubyuser_agent_parserRange2.6.0
VendorProductVersionCPE
rubyuser_agent_parser*cpe:2.3:a:ruby:user_agent_parser:*:*:*:*:*:*:*:*

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H