CVE-2021-22902
11.06.2021, 16:15
The actionpack ruby gem (a framework for handling and responding to web requests in Rails) before 6.0.3.7, 6.1.3.2 suffers from a possible denial of service vulnerability in the Mime type parser of Action Dispatch. Carefully crafted Accept headers can cause the mime type parser in Action Dispatch to do catastrophic backtracking in the regular expression engine.Enginsight
Vendor | Product | Version |
---|---|---|
rubyonrails | rails | 6.0.0 ≤ 𝑥 < 6.0.3.7 |
rubyonrails | rails | 6.1.0 ≤ 𝑥 < 6.1.0.2 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Ubuntu Product | |||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
rails |
| ||||||||||||||||||||||||
rails-4.0 |
| ||||||||||||||||||||||||
ruby-actionpack-3.2 |
| ||||||||||||||||||||||||
ruby-activemodel-3.2 |
| ||||||||||||||||||||||||
ruby-activerecord-3.2 |
| ||||||||||||||||||||||||
ruby-activesupport-3.2 |
| ||||||||||||||||||||||||
ruby-rails-3.2 |
|
References