You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The actionpack ruby gem before 6.1.3.2, 6.0.3.7, 5.2.4.6, 5.2.6 suffers from a possible denial of service vulnerability in the Token Authentication logic in Action Controller due to a too permissive regular expression. Impacted code uses authenticate_or_request_with_http_token or authenticate_with_http_token for request authentication.
CVE-2021-22904 - High Severity Vulnerability
Vulnerable Library - actionpack-5.2.4.5.gem
Web apps on Rails. Simple, battle-tested conventions for building and testing MVC web applications. Works with any Rack-compatible server.
Library home page: https://rubygems.org/gems/actionpack-5.2.4.5.gem
Dependency Hierarchy:
Found in HEAD commit: acc731e7aca616aaa29e04a5a0882f2559c48e85
Vulnerability Details
The actionpack ruby gem before 6.1.3.2, 6.0.3.7, 5.2.4.6, 5.2.6 suffers from a possible denial of service vulnerability in the Token Authentication logic in Action Controller due to a too permissive regular expression. Impacted code uses
authenticate_or_request_with_http_token
orauthenticate_with_http_token
for request authentication.Publish Date: 2021-06-11
URL: CVE-2021-22904
CVSS 3 Score Details (7.5)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: rubysec/ruby-advisory-db@691f9dc
Release Date: 2021-06-11
Fix Resolution: actionpack - 5.2.4.6,5.2.6,6.0.3.7,6.1.3.2
Step up your Open Source Security Game with WhiteSource here
The text was updated successfully, but these errors were encountered: