Lucene search

K
githubGitHub Advisory DatabaseGHSA-HWW2-5G85-429M
HistoryJun 29, 2023 - 3:30 p.m.

URI gem has ReDoS vulnerability

2023-06-2915:30:34
CWE-1333
GitHub Advisory Database
github.com
31
uri gem
redos
vulnerability
fix
version update
ruby
parser
execution time

CVSS3

5.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

EPSS

0.004

Percentile

72.3%

A ReDoS issue was discovered in the URI component before 0.12.2 for Ruby. The URI parser mishandles invalid URLs that have specific characters. There is an increase in execution time for parsing strings to URI objects with rfc2396_parser.rb and rfc3986_parser.rb.

NOTE: this issue exists becuse of an incomplete fix for CVE-2023-28755. Version 0.10.3 is also a fixed version.

The Ruby advisory recommends updating the uri gem to 0.12.2. In order to ensure compatibility with the bundled version in older Ruby series, you may update as follows instead:

  • For Ruby 3.0: Update to uri 0.10.3
  • For Ruby 3.1 and 3.2: Update to uri 0.12.2.

You can use gem update uri to update it. If you are using bundler, please add gem uri, >= 0.12.2 (or other version mentioned above) to your Gemfile.

Affected configurations

Vulners
Node
lambdaislanduriRange<0.10.0.3
OR
lambdaislanduriRange0.11.00.11.2
OR
lambdaislanduriRange0.12.00.12.2
OR
lambdaislanduriRange0.10.10.10.3
VendorProductVersionCPE
lambdaislanduri*cpe:2.3:a:lambdaisland:uri:*:*:*:*:*:*:*:*

References

CVSS3

5.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

EPSS

0.004

Percentile

72.3%