CVE-2021-22902

The actionpack ruby gem (a framework for handling and responding to web requests in Rails) before 6.0.3.7, 6.1.3.2 suffers from a possible denial of service vulnerability in the Mime type parser of Action Dispatch. Carefully crafted Accept headers can cause the mime type parser in Action Dispatch to do catastrophic backtracking in the regular expression engine.
References
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:rubyonrails:rails:*:*:*:*:*:*:*:*
cpe:2.3:a:rubyonrails:rails:*:*:*:*:*:*:*:*

History

22 Jun 2021, 17:58

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : 5.0
v3 : 7.5
CWE NVD-CWE-noinfo
References (MISC) https://hackerone.com/reports/1138654 - (MISC) https://hackerone.com/reports/1138654 - Permissions Required, Third Party Advisory
References (MISC) https://discuss.rubyonrails.org/t/cve-2021-22902-possible-denial-of-service-vulnerability-in-action-dispatch/77866 - (MISC) https://discuss.rubyonrails.org/t/cve-2021-22902-possible-denial-of-service-vulnerability-in-action-dispatch/77866 - Exploit, Mitigation, Patch, Vendor Advisory
CPE cpe:2.3:a:rubyonrails:rails:*:*:*:*:*:*:*:*

11 Jun 2021, 17:18

Type Values Removed Values Added
New CVE

Information

Published : 2021-06-11 16:15

Updated : 2023-12-10 13:55


NVD link : CVE-2021-22902

Mitre link : CVE-2021-22902

CVE.ORG link : CVE-2021-22902


JSON object : View

Products Affected

rubyonrails

  • rails
CWE
NVD-CWE-noinfo CWE-400

Uncontrolled Resource Consumption