Vulnerability Name: | CVE-2021-32740 (CCN-204936) | ||||||||||||||||
Assigned: | 2021-07-03 | ||||||||||||||||
Published: | 2021-07-03 | ||||||||||||||||
Updated: | 2021-09-21 | ||||||||||||||||
Summary: | Addressable is an alternative implementation to the URI implementation that is part of Ruby's standard library. An uncontrolled resource consumption vulnerability exists after version 2.3.0 through version 2.7.0. Within the URI template implementation in Addressable, a maliciously crafted template may result in uncontrolled resource consumption, leading to denial of service when matched against a URI. In typical usage, templates would not normally be read from untrusted user input, but nonetheless, no previous security advisory for Addressable has cautioned against doing this. Users of the parsing capabilities in Addressable but not the URI template capabilities are unaffected. The vulnerability is patched in version 2.8.0. As a workaround, only create Template objects from trusted sources that have been validated not to produce catastrophic backtracking. | ||||||||||||||||
CVSS v3 Severity: | 7.5 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) 6.5 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)
6.5 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)
| ||||||||||||||||
CVSS v2 Severity: | 5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
| ||||||||||||||||
Vulnerability Type: | CWE-400 | ||||||||||||||||
Vulnerability Consequences: | Denial of Service | ||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2021-32740 Source: XF Type: UNKNOWN addressable-cve202132740-dos(204936) Source: MISC Type: Patch, Release Notes, Third Party Advisory https://github.com/sporkmonger/addressable/commit/0d8a3127e35886ce9284810a7f2438bff6b43cbc Source: CCN Type: Addressable GIT Repository Regular Expression Denial of Service in Addressable templates Source: CONFIRM Type: Third Party Advisory https://github.com/sporkmonger/addressable/security/advisories/GHSA-jxhc-q857-3j6g Source: FEDORA Type: Mailing List, Third Party Advisory FEDORA-2021-e9fc035565 Source: FEDORA Type: Mailing List, Third Party Advisory FEDORA-2021-5d14763df8 | ||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: ![]() | ||||||||||||||||
Oval Definitions | |||||||||||||||||
| |||||||||||||||||
BACK |