CVE-2023-36617

See a problem?
Source
https://nvd.nist.gov/vuln/detail/CVE-2023-36617
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-36617.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-36617
Aliases
Related
Published
2023-06-29T13:15:09Z
Modified
2024-09-11T06:12:57.606504Z
Severity
  • 5.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L CVSS Calculator
Summary
[none]
Details

A ReDoS issue was discovered in the URI component before 0.12.2 for Ruby. The URI parser mishandles invalid URLs that have specific characters. There is an increase in execution time for parsing strings to URI objects with rfc2396parser.rb and rfc3986parser.rb. NOTE: this issue exists becuse of an incomplete fix for CVE-2023-28755. Version 0.10.3 is also a fixed version.

References

Affected packages

Debian:11 / ruby2.7

Package

Name
ruby2.7
Purl
pkg:deb/debian/ruby2.7?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.7.4-1+deb11u2

Affected versions

2.*

2.7.4-1
2.7.4-1+deb11u1

Ecosystem specific

{
    "urgency": "not yet assigned"
}