There is a denial of service vulnerability in the If-Match
and If-None-Match
header parsing component of Sinatra, if the etag
method is used when constructing the response and you are using Ruby < 3.2.
Carefully crafted input can cause If-Match
and If-None-Match
header parsing in Sinatra to take an unexpected amount of time, possibly resulting in a denial of service attack vector. This header is typically involved in generating the ETag
header value. Any applications that use the etag
method when generating a response are impacted if they are using Ruby below version 3.2.
{ "cwe_ids": [ "CWE-1333", "CWE-400" ], "severity": "LOW", "github_reviewed": true, "nvd_published_at": "2025-10-10T20:15:38Z", "github_reviewed_at": "2025-10-10T20:28:47Z" }