• CVE-2023-22792

发布时间: 2024年2月8日

修改时间: 2024年10月31日

概要

A regular expression based DoS vulnerability in Action Dispatch <6.0.6.1,< 6.1.7.1, and <7.0.4.1. Specially crafted cookies, in combination with a specially crafted X_FORWARDED_HOST header can cause the regular expression engine to enter a state of catastrophic backtracking. This can cause the process to use large amounts of CPU and memory, leading to a possible DoS vulnerability All users running an affected release should either upgrade or use one of the workarounds immediately.

CVSS v3 指标

NVD openEuler
Confidentiality None None
Attack Vector Network Network
CVSS评分 7.5 7.5
Attack Complexity Low Low
Privileges Required None None
Scope Unchanged Unchanged
Integrity None None
User Interaction None None
Availability High High

安全公告

公告名 概要 发布时间
KylinSec-SA-2024-1494 rubygem-actionpack security update 2024年2月8日

影响产品

产品 状态
KY3.4-4A rubygem-actionpack Fixed
KY3.4-5A rubygem-actionpack Fixed
KY3.5.1 rubygem-actionpack Fixed
KY3.5.2 rubygem-actionpack Fixed