- Description
- The actionpack ruby gem (a framework for handling and responding to web requests in Rails) before 6.0.3.7, 6.1.3.2 suffers from a possible denial of service vulnerability in the Mime type parser of Action Dispatch. Carefully crafted Accept headers can cause the mime type parser in Action Dispatch to do catastrophic backtracking in the regular expression engine.
- Source
- support@hackerone.com
- NVD status
- Analyzed
CVSS 3.1
- Type
- Primary
- Base score
- 7.5
- Impact score
- 3.6
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
- Severity
- HIGH
CVSS 2.0
- Type
- Primary
- Base score
- 5
- Impact score
- 2.9
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:N/I:N/A:P
- nvd@nist.gov
- NVD-CWE-noinfo
- support@hackerone.com
- CWE-400
- Hype score
- Not currently trending
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:rubyonrails:rails:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "B73C8592-5E69-4033-9BDC-52D27EE3D25D",
"versionEndExcluding": "6.0.3.7",
"versionStartIncluding": "6.0.0"
},
{
"criteria": "cpe:2.3:a:rubyonrails:rails:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "DEFD8950-2F5E-4D75-BEAD-E8443B76F1C4",
"versionEndExcluding": "6.1.0.2",
"versionStartIncluding": "6.1.0"
}
],
"operator": "OR"
}
]
}
]