7.5
CVSSv3

CVE-2023-22796

Published: 09/02/2023 Updated: 02/02/2024
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 0

Vulnerability Summary

A regular expression based DoS vulnerability in Active Support <6.1.7.1 and <7.0.4.1. A specially crafted string passed to the underscore method can cause the regular expression engine to enter a state of catastrophic backtracking. This can cause the process to use large amounts of CPU and memory, leading to a possible DoS vulnerability.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

activesupport project activesupport

Vendor Advisories

Synopsis Moderate: Logging Subsystem 574 - Red Hat OpenShift bug fix and security update Type/Severity Security Advisory: Moderate Topic Logging Subsystem 574 - Red Hat OpenShiftRed Hat Product Security has rated this update as having a security impact of Low A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed ...
Debian Bug report logs - #1030050 rails: CVE-2023-22796 CVE-2023-22795 CVE-2023-22794 CVE-2023-22792 CVE-2022-44566 Package: src:rails; Maintainer for src:rails is Debian Ruby Team &lt;pkg-ruby-extras-maintainers@listsaliothdebianorg&gt;; Reported by: Moritz Mühlenhoff &lt;jmm@inutilorg&gt; Date: Mon, 30 Jan 2023 18:00:01 UT ...
Multiple vulnerabilities were discovered in rails, the Ruby based server-side MVC web application framework, which could result in XSS, data disclosure and open redirect For the stable distribution (bullseye), these problems have been fixed in version 2:6037+dfsg-2+deb11u1 We recommend that you upgrade your rails packages For the detailed sec ...
Description<!----> This CVE is under investigation by Red Hat Product Security ...