Bug 2319036 (CVE-2024-41128) - CVE-2024-41128 rubygem-actionpack: Possible ReDoS vulnerability in query parameter filtering in Action Dispatch
Summary: CVE-2024-41128 rubygem-actionpack: Possible ReDoS vulnerability in query para...
Keywords:
Status: NEW
Alias: CVE-2024-41128
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On: 2319054 2319053
Blocks:
TreeView+ depends on / blocked
 
Reported: 2024-10-16 01:01 UTC by OSIDB Bzimport
Modified: 2024-10-16 15:53 UTC (History)
18 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2024-10-16 01:01:45 UTC
There is a possible ReDoS vulnerability in the query parameter filtering routines of Action Dispatch. This vulnerability has been assigned the CVE identifier CVE-2024-41128.

Impact
------

Carefully crafted query parameters can cause query parameter filtering to take an unexpected amount of time, possibly resulting in a DoS vulnerability. All users running an affected release should either upgrade or apply the relevant patch immediately.

Ruby 3.2 has mitigations for this problem, so Rails applications using Ruby 3.2 or newer are unaffected. Rails 8.0.0.beta1 depends on Ruby 3.2 or greater so is unaffected.


Releases
--------
The fixed releases are available at the normal locations.

Workarounds
-----------
Users on Ruby 3.2 are unaffected by this issue.


Credits
-------

Thanks to [scyoon](https://hackerone.com/scyoon) for the report and patches!


Note You need to log in before you can comment on or make changes to this bug.