Date.parse in the date gem through 3.2.0 for Ruby allows ReDoS (regular expression Denial of Service) via a long string. The fixed versions are 3.2.1, 3.1.2, 3.0.2, and 2.0.1.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
Configuration 6 (hide)
|
History
24 Jan 2024, 05:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
08 Aug 2023, 14:22
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-1333 |
10 Sep 2022, 02:39
Type | Values Removed | Values Added |
---|---|---|
References | (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UTOJGS5IEFDK3UOO7IY4OTTFGHGLSWZF/ - Mailing List, Third Party Advisory | |
References | (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IUXQCH6FRKANCVZO2Q7D2SQX33FP3KWN/ - Mailing List, Third Party Advisory |
08 May 2022, 04:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
11 Jan 2022, 21:31
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 5.0
v3 : 7.5 |
CWE | NVD-CWE-Other | |
CPE | cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise:15.0:*:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:* cpe:2.3:a:opensuse:factory:-:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:* cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:* cpe:2.3:a:ruby-lang:date:*:*:*:*:*:ruby:*:* cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:* cpe:2.3:a:redhat:software_collections:-:*:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:* cpe:2.3:a:ruby-lang:date:3.2.0:*:*:*:*:ruby:*:* cpe:2.3:a:ruby-lang:ruby:*:*:*:*:*:*:*:* |
|
References | (MISC) https://hackerone.com/reports/1254844 - Permissions Required | |
References | (CONFIRM) https://www.ruby-lang.org/en/news/2021/11/15/date-parsing-method-regexp-dos-cve-2021-41817/ - Exploit, Vendor Advisory |
01 Jan 2022, 05:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-01-01 05:15
Updated : 2024-02-04 22:08
NVD link : CVE-2021-41817
Mitre link : CVE-2021-41817
CVE.ORG link : CVE-2021-41817
JSON object : View
Products Affected
redhat
- software_collections
- enterprise_linux
debian
- debian_linux
fedoraproject
- fedora
suse
- linux_enterprise
opensuse
- factory
- leap
ruby-lang
- ruby
- date
CWE
CWE-1333
Inefficient Regular Expression Complexity