Skip to content

RubyGems Regular Expression Denial of Service

Moderate severity GitHub Reviewed Published May 17, 2022 to the GitHub Advisory Database • Updated Aug 16, 2023

Package

bundler rubygems-update (RubyGems)

Affected versions

< 1.8.23.2
>= 1.8.24, < 1.8.27
>= 2.0.0, < 2.0.10
>= 2.1.0, < 2.1.5

Patched versions

1.8.23.2
1.8.27
2.0.10
2.1.5

Description

Algorithmic complexity vulnerability in Gem::Version::ANCHORED_VERSION_PATTERN in lib/rubygems/version.rb in RubyGems before 1.8.23.2, 1.8.24 through 1.8.26, 2.0.x before 2.0.10, and 2.1.x before 2.1.5, as used in Ruby 1.9.0 through 2.0.0p247, allows remote attackers to cause a denial of service (CPU consumption) via a crafted gem version that triggers a large amount of backtracking in a regular expression. NOTE: this issue is due to an incomplete fix for CVE-2013-4287.

References

Published by the National Vulnerability Database Oct 17, 2013
Published to the GitHub Advisory Database May 17, 2022
Reviewed Mar 8, 2023
Last updated Aug 16, 2023

Severity

Moderate

EPSS score

Exploit Prediction Scoring System (EPSS)

This score estimates the probability of this vulnerability being exploited within the next 30 days. Data provided by FIRST.
(71st percentile)

Weaknesses

No CWEs

CVE ID

CVE-2013-4363

GHSA ID

GHSA-9qvm-2vhf-q649

Source code

Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.