cfscode / resque-web

a Rails-based web interface to Resque
0 stars 0 forks source link

CVE-2020-7663 (High) detected in websocket-extensions-0.1.2.gem #40

Open mend-bolt-for-github[bot] opened 3 years ago

mend-bolt-for-github[bot] commented 3 years ago

CVE-2020-7663 - High Severity Vulnerability

Vulnerable Library - websocket-extensions-0.1.2.gem

Library home page: https://rubygems.org/gems/websocket-extensions-0.1.2.gem

Path to dependency file: /Gemfile.lock

Path to vulnerable library: /Gemfile.lock

Dependency Hierarchy: - minitest-spec-rails-5.4.0.gem (Root Library) - rails-5.0.2.gem - actioncable-5.0.2.gem - websocket-driver-0.6.5.gem - :x: **websocket-extensions-0.1.2.gem** (Vulnerable Library)

Found in base branch: master

Vulnerability Details

websocket-extensions ruby module prior to 0.1.5 allows Denial of Service (DoS) via Regex Backtracking. The extension parser may take quadratic time when parsing a header containing an unclosed string parameter value whose content is a repeating two-byte sequence of a backslash and some other character. This could be abused by an attacker to conduct Regex Denial Of Service (ReDoS) on a single-threaded server by providing a malicious payload with the Sec-WebSocket-Extensions header.

Publish Date: 2020-06-02

URL: CVE-2020-7663

CVSS 3 Score Details (7.5)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7663

Release Date: 2020-09-17

Fix Resolution: websocket-extensions:0.1.5


Step up your Open Source Security Game with Mend here