The actionpack ruby gem (a framework for handling and responding to web requests in Rails) before 6.0.3.7, 6.1.3.2 suffers from a possible denial of service vulnerability in the Mime type parser of Action Dispatch. Carefully crafted Accept headers can cause the mime type parser in Action Dispatch to do catastrophic backtracking in the regular expression engine.
The product does not properly control the allocation and maintenance of a limited resource.
Link | Tags |
---|---|
https://hackerone.com/reports/1138654 | third party advisory permissions required |
https://discuss.rubyonrails.org/t/cve-2021-22902-possible-denial-of-service-vulnerability-in-action-dispatch/77866 | patch vendor advisory mitigation exploit |