The PostgreSQL adapter in Active Record before 6.1.2.1, 6.0.3.5, 5.2.4.5 suffers from a regular expression denial of service (REDoS) vulnerability. Carefully crafted input can cause the input validation in the `money` type of the PostgreSQL adapter in Active Record to spend too much time in a regular expression, resulting in the potential for a DoS attack. This only impacts Rails applications that are using PostgreSQL along with money type columns that take user input.
References
Link | Resource |
---|---|
https://discuss.rubyonrails.org/t/cve-2021-22880-possible-dos-vulnerability-in-active-record-postgresql-adapter/77129 | Mitigation Patch Vendor Advisory |
https://hackerone.com/reports/1023899 | Exploit Patch Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MO5OJ3F4ZL3UXVLJO6ECANRVZBNRS2IH/ | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XQ3NS4IBYE2I3MVMGAHFZBZBIZGHXHT3/ | |
https://security.netapp.com/advisory/ntap-20210805-0009/ | Third Party Advisory |
https://www.debian.org/security/2021/dsa-4929 | Third Party Advisory |
Configurations
History
07 Nov 2023, 03:30
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
04 Jan 2022, 16:38
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
References | (DEBIAN) https://www.debian.org/security/2021/dsa-4929 - Third Party Advisory |
10 Jun 2021, 16:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
23 Mar 2021, 19:51
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:* |
|
References | (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XQ3NS4IBYE2I3MVMGAHFZBZBIZGHXHT3/ - Mailing List, Third Party Advisory | |
References | (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MO5OJ3F4ZL3UXVLJO6ECANRVZBNRS2IH/ - Mailing List, Third Party Advisory |
13 Mar 2021, 23:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
12 Mar 2021, 23:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
17 Feb 2021, 20:35
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 5.0
v3 : 7.5 |
CPE | cpe:2.3:a:rubyonrails:rails:*:*:*:*:*:*:*:* | |
References | (MISC) https://discuss.rubyonrails.org/t/cve-2021-22880-possible-dos-vulnerability-in-active-record-postgresql-adapter/77129 - Mitigation, Patch, Vendor Advisory | |
References | (MISC) https://hackerone.com/reports/1023899 - Exploit, Patch, Third Party Advisory | |
CWE | CWE-400 |
11 Feb 2021, 18:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2021-02-11 18:15
Updated : 2023-12-10 13:41
NVD link : CVE-2021-22880
Mitre link : CVE-2021-22880
CVE.ORG link : CVE-2021-22880
JSON object : View
Products Affected
rubyonrails
- rails
fedoraproject
- fedora
CWE
CWE-400
Uncontrolled Resource Consumption