CVE-2024-26142

Rails is a web-application framework. Starting in version 7.1.0, there is a possible ReDoS vulnerability in the Accept header parsing routines of Action Dispatch. This vulnerability is patched in 7.1.3.1. Ruby 3.2 has mitigations for this problem, so Rails applications using Ruby 3.2 or newer are unaffected.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:rubyonrails:rails:*:*:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:*:*:*:*:*:*:*:*

History

14 Feb 2025, 16:22

Type Values Removed Values Added
First Time Ruby-lang ruby
Ruby-lang
Rubyonrails
Rubyonrails rails
CPE cpe:2.3:a:rubyonrails:rails:*:*:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:*:*:*:*:*:*:*:*
References () https://discuss.rubyonrails.org/t/possible-redos-vulnerability-in-accept-header-parsing-in-action-dispatch/84946 - () https://discuss.rubyonrails.org/t/possible-redos-vulnerability-in-accept-header-parsing-in-action-dispatch/84946 - Vendor Advisory
References () https://github.com/rails/rails/commit/b4d3bfb5ed8a5b5a90aad3a3b28860c7a931e272 - () https://github.com/rails/rails/commit/b4d3bfb5ed8a5b5a90aad3a3b28860c7a931e272 - Patch
References () https://github.com/rails/rails/security/advisories/GHSA-jjhx-jhvp-74wq - () https://github.com/rails/rails/security/advisories/GHSA-jjhx-jhvp-74wq - Vendor Advisory
References () https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2024-26142.yml - () https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2024-26142.yml - Third Party Advisory
References () https://security.netapp.com/advisory/ntap-20240503-0003/ - () https://security.netapp.com/advisory/ntap-20240503-0003/ - Third Party Advisory

Information

Published : 2024-02-27 16:15

Updated : 2025-02-14 16:22


NVD link : CVE-2024-26142

Mitre link : CVE-2024-26142

CVE.ORG link : CVE-2024-26142


JSON object : View

Products Affected

rubyonrails

  • rails

ruby-lang

  • ruby
CWE
CWE-1333

Inefficient Regular Expression Complexity