- Description
- The actionpack ruby gem before 6.1.3.2, 6.0.3.7, 5.2.4.6, 5.2.6 suffers from a possible denial of service vulnerability in the Token Authentication logic in Action Controller due to a too permissive regular expression. Impacted code uses `authenticate_or_request_with_http_token` or `authenticate_with_http_token` for request authentication.
- Source
- support@hackerone.com
- NVD status
- Analyzed
CVSS 3.1
- Type
- Primary
- Base score
- 7.5
- Impact score
- 3.6
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
- Severity
- HIGH
CVSS 2.0
- Type
- Primary
- Base score
- 5
- Impact score
- 2.9
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:N/I:N/A:P
- nvd@nist.gov
- NVD-CWE-Other
- support@hackerone.com
- CWE-400
- Hype score
- Not currently trending
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:rubyonrails:rails:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "09E7ED24-FC47-4C5C-B34D-9EC1235E9D0B",
"versionEndExcluding": "5.2.4.6"
},
{
"criteria": "cpe:2.3:a:rubyonrails:rails:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "ED2D04BE-4E2E-4E5D-96F1-E6C96E1FE9B3",
"versionEndExcluding": "5.2.6",
"versionStartIncluding": "5.2.5"
},
{
"criteria": "cpe:2.3:a:rubyonrails:rails:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "B73C8592-5E69-4033-9BDC-52D27EE3D25D",
"versionEndExcluding": "6.0.3.7",
"versionStartIncluding": "6.0.0"
},
{
"criteria": "cpe:2.3:a:rubyonrails:rails:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "C1755DF8-CDBB-483F-86BF-E5D4D9F4DBE7",
"versionEndExcluding": "6.1.3.2",
"versionStartIncluding": "6.1.0"
}
],
"operator": "OR"
}
]
}
]