RubyGems Regular Expression Denial of Service
Moderate severity
GitHub Reviewed
Published
May 17, 2022
to the GitHub Advisory Database
•
Updated Aug 16, 2023
Package
Affected versions
< 1.8.23.2
>= 1.8.24, < 1.8.27
>= 2.0.0, < 2.0.10
>= 2.1.0, < 2.1.5
Patched versions
1.8.23.2
1.8.27
2.0.10
2.1.5
Description
Published by the National Vulnerability Database
Oct 17, 2013
Published to the GitHub Advisory Database
May 17, 2022
Reviewed
Mar 8, 2023
Last updated
Aug 16, 2023
Algorithmic complexity vulnerability in
Gem::Version::ANCHORED_VERSION_PATTERN
inlib/rubygems/version.rb
in RubyGems before 1.8.23.2, 1.8.24 through 1.8.26, 2.0.x before 2.0.10, and 2.1.x before 2.1.5, as used in Ruby 1.9.0 through 2.0.0p247, allows remote attackers to cause a denial of service (CPU consumption) via a crafted gem version that triggers a large amount of backtracking in a regular expression. NOTE: this issue is due to an incomplete fix for CVE-2013-4287.References