CVE-2021-22904
Published Jun 11, 2021
Last updated 3 years ago
Overview
- Description
- The actionpack ruby gem before 6.1.3.2, 6.0.3.7, 5.2.4.6, 5.2.6 suffers from a possible denial of service vulnerability in the Token Authentication logic in Action Controller due to a too permissive regular expression. Impacted code uses `authenticate_or_request_with_http_token` or `authenticate_with_http_token` for request authentication.
- Source
- support@hackerone.com
- NVD status
- Analyzed
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 7.5
- Impact score
- 3.6
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
- Severity
- HIGH
CVSS 2.0
- Type
- Primary
- Base score
- 5
- Impact score
- 2.9
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:N/I:N/A:P
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
- support@hackerone.com
- CWE-400
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:rubyonrails:rails:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "09E7ED24-FC47-4C5C-B34D-9EC1235E9D0B", "versionEndExcluding": "5.2.4.6" }, { "criteria": "cpe:2.3:a:rubyonrails:rails:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "ED2D04BE-4E2E-4E5D-96F1-E6C96E1FE9B3", "versionEndExcluding": "5.2.6", "versionStartIncluding": "5.2.5" }, { "criteria": "cpe:2.3:a:rubyonrails:rails:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B73C8592-5E69-4033-9BDC-52D27EE3D25D", "versionEndExcluding": "6.0.3.7", "versionStartIncluding": "6.0.0" }, { "criteria": "cpe:2.3:a:rubyonrails:rails:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C1755DF8-CDBB-483F-86BF-E5D4D9F4DBE7", "versionEndExcluding": "6.1.3.2", "versionStartIncluding": "6.1.0" } ], "operator": "OR" } ] } ]