CVE-2024-26142

Rails is a web-application framework. Starting in version 7.1.0, there is a possible ReDoS vulnerability in the Accept header parsing routines of Action Dispatch. This vulnerability is patched in 7.1.3.1. Ruby 3.2 has mitigations for this problem, so Rails applications using Ruby 3.2 or newer are unaffected.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:rubyonrails:rails:*:*:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:*:*:*:*:*:*:*:*

History

14 Feb 2025, 16:22

Type Values Removed Values Added
References () https://github.com/rails/rails/commit/b4d3bfb5ed8a5b5a90aad3a3b28860c7a931e272 - () https://github.com/rails/rails/commit/b4d3bfb5ed8a5b5a90aad3a3b28860c7a931e272 - Patch
References () https://discuss.rubyonrails.org/t/possible-redos-vulnerability-in-accept-header-parsing-in-action-dispatch/84946 - () https://discuss.rubyonrails.org/t/possible-redos-vulnerability-in-accept-header-parsing-in-action-dispatch/84946 - Vendor Advisory
References () https://security.netapp.com/advisory/ntap-20240503-0003/ - () https://security.netapp.com/advisory/ntap-20240503-0003/ - Third Party Advisory
References () https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2024-26142.yml - () https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2024-26142.yml - Third Party Advisory
References () https://github.com/rails/rails/security/advisories/GHSA-jjhx-jhvp-74wq - () https://github.com/rails/rails/security/advisories/GHSA-jjhx-jhvp-74wq - Vendor Advisory
First Time Rubyonrails rails
Ruby-lang
Ruby-lang ruby
Rubyonrails
CPE cpe:2.3:a:ruby-lang:ruby:*:*:*:*:*:*:*:*
cpe:2.3:a:rubyonrails:rails:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5
CWE CWE-1333

03 May 2024, 13:15

Type Values Removed Values Added
References
  • () https://security.netapp.com/advisory/ntap-20240503-0003/ -

27 Feb 2024, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-02-27 16:15

Updated : 2025-02-14 16:22


NVD link : CVE-2024-26142

Mitre link : CVE-2024-26142


JSON object : View

Products Affected

ruby-lang

  • ruby

rubyonrails

  • rails
CWE
CWE-1333

Inefficient Regular Expression Complexity