Rails is a web-application framework. Starting in version 7.1.0, there is a possible ReDoS vulnerability in the Accept header parsing routines of Action Dispatch. This vulnerability is patched in 7.1.3.1. Ruby 3.2 has mitigations for this problem, so Rails applications using Ruby 3.2 or newer are unaffected.
References
Configurations
Configuration 1 (hide)
AND |
|
History
14 Feb 2025, 16:22
Type | Values Removed | Values Added |
---|---|---|
References | () https://discuss.rubyonrails.org/t/possible-redos-vulnerability-in-accept-header-parsing-in-action-dispatch/84946 - Vendor Advisory | |
References | () https://github.com/rails/rails/commit/b4d3bfb5ed8a5b5a90aad3a3b28860c7a931e272 - Patch | |
References | () https://github.com/rails/rails/security/advisories/GHSA-jjhx-jhvp-74wq - Vendor Advisory | |
References | () https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2024-26142.yml - Third Party Advisory | |
References | () https://security.netapp.com/advisory/ntap-20240503-0003/ - Third Party Advisory | |
CPE | cpe:2.3:a:rubyonrails:rails:*:*:*:*:*:*:*:* cpe:2.3:a:ruby-lang:ruby:*:*:*:*:*:*:*:* |
|
First Time |
Ruby-lang
Ruby-lang ruby Rubyonrails Rubyonrails rails |
21 Nov 2024, 09:02
Type | Values Removed | Values Added |
---|---|---|
References | () https://discuss.rubyonrails.org/t/possible-redos-vulnerability-in-accept-header-parsing-in-action-dispatch/84946 - | |
References | () https://github.com/rails/rails/commit/b4d3bfb5ed8a5b5a90aad3a3b28860c7a931e272 - | |
References | () https://github.com/rails/rails/security/advisories/GHSA-jjhx-jhvp-74wq - | |
References | () https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2024-26142.yml - | |
References | () https://security.netapp.com/advisory/ntap-20240503-0003/ - |
03 May 2024, 13:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
27 Feb 2024, 16:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-02-27 16:15
Updated : 2025-02-14 16:22
NVD link : CVE-2024-26142
Mitre link : CVE-2024-26142
CVE.ORG link : CVE-2024-26142
JSON object : View
Products Affected
ruby-lang
- ruby
rubyonrails
- rails
CWE
CWE-1333
Inefficient Regular Expression Complexity