CVE-2024-26142

Rails is a web-application framework. Starting in version 7.1.0, there is a possible ReDoS vulnerability in the Accept header parsing routines of Action Dispatch. This vulnerability is patched in 7.1.3.1. Ruby 3.2 has mitigations for this problem, so Rails applications using Ruby 3.2 or newer are unaffected.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:rubyonrails:rails:*:*:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:*:*:*:*:*:*:*:*

History

14 Feb 2025, 16:22

Type Values Removed Values Added
References () https://discuss.rubyonrails.org/t/possible-redos-vulnerability-in-accept-header-parsing-in-action-dispatch/84946 - () https://discuss.rubyonrails.org/t/possible-redos-vulnerability-in-accept-header-parsing-in-action-dispatch/84946 - Vendor Advisory
References () https://github.com/rails/rails/commit/b4d3bfb5ed8a5b5a90aad3a3b28860c7a931e272 - () https://github.com/rails/rails/commit/b4d3bfb5ed8a5b5a90aad3a3b28860c7a931e272 - Patch
References () https://github.com/rails/rails/security/advisories/GHSA-jjhx-jhvp-74wq - () https://github.com/rails/rails/security/advisories/GHSA-jjhx-jhvp-74wq - Vendor Advisory
References () https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2024-26142.yml - () https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2024-26142.yml - Third Party Advisory
References () https://security.netapp.com/advisory/ntap-20240503-0003/ - () https://security.netapp.com/advisory/ntap-20240503-0003/ - Third Party Advisory
CPE cpe:2.3:a:rubyonrails:rails:*:*:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:*:*:*:*:*:*:*:*
First Time Ruby-lang
Ruby-lang ruby
Rubyonrails
Rubyonrails rails

21 Nov 2024, 09:02

Type Values Removed Values Added
References () https://discuss.rubyonrails.org/t/possible-redos-vulnerability-in-accept-header-parsing-in-action-dispatch/84946 - () https://discuss.rubyonrails.org/t/possible-redos-vulnerability-in-accept-header-parsing-in-action-dispatch/84946 -
References () https://github.com/rails/rails/commit/b4d3bfb5ed8a5b5a90aad3a3b28860c7a931e272 - () https://github.com/rails/rails/commit/b4d3bfb5ed8a5b5a90aad3a3b28860c7a931e272 -
References () https://github.com/rails/rails/security/advisories/GHSA-jjhx-jhvp-74wq - () https://github.com/rails/rails/security/advisories/GHSA-jjhx-jhvp-74wq -
References () https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2024-26142.yml - () https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2024-26142.yml -
References () https://security.netapp.com/advisory/ntap-20240503-0003/ - () https://security.netapp.com/advisory/ntap-20240503-0003/ -

03 May 2024, 13:15

Type Values Removed Values Added
References
  • () https://security.netapp.com/advisory/ntap-20240503-0003/ -

27 Feb 2024, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-02-27 16:15

Updated : 2025-02-14 16:22


NVD link : CVE-2024-26142

Mitre link : CVE-2024-26142

CVE.ORG link : CVE-2024-26142


JSON object : View

Products Affected

ruby-lang

  • ruby

rubyonrails

  • rails
CWE
CWE-1333

Inefficient Regular Expression Complexity