445
VMScore

CVE-2021-22904

Published: 11/06/2021 Updated: 20/09/2021
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

The actionpack ruby gem prior to 6.1.3.2, 6.0.3.7, 5.2.4.6, 5.2.6 suffers from a possible denial of service vulnerability in the Token Authentication logic in Action Controller due to a too permissive regular expression. Impacted code uses `authenticate_or_request_with_http_token` or `authenticate_with_http_token` for request authentication.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

rubyonrails rails

Vendor Advisories

Debian Bug report logs - #988214 CVE-2021-22885 CVE-2021-22902 CVE-2021-22904 Package: rails; Maintainer for rails is Debian Ruby Team <pkg-ruby-extras-maintainers@listsaliothdebianorg>; Source for rails is src:rails (PTS, buildd, popcon) Reported by: Moritz Muehlenhoff <jmm@debianorg> Date: Fri, 7 May 2021 19:3 ...
Multiple security issues were discovered in the Rails web framework which could result in denial of service For the stable distribution (buster), these problems have been fixed in version 2:5221+dfsg-1+deb10u3 We recommend that you upgrade your rails packages For the detailed security status of rails please refer to its security tracker page ...
A flaw was found in RubyGem Actionpack which is framework for handling and responding to web requests in Rails A possible DoS vulnerability was found in the Token Authentication logic in Action Controller ...
There is a possible denial of service (DoS) vulnerability in the Token Authentication logic in Action Controller before versions 6132, 6037, 5246 and 526 Impacted code uses "authenticate_or_request_with_http_token" or "authenticate_with_http_token" for request authentication ...