eldorplus / docker-web-ui

Docker Automation
0 stars 0 forks source link

CVE-2020-7663 (High) detected in websocket-extensions-0.1.2.gem #111

Open mend-bolt-for-github[bot] opened 1 year ago

mend-bolt-for-github[bot] commented 1 year ago

CVE-2020-7663 - High Severity Vulnerability

Vulnerable Library - websocket-extensions-0.1.2.gem

Library home page: https://rubygems.org/gems/websocket-extensions-0.1.2.gem

Path to dependency file: /Gemfile.lock

Path to vulnerable library: /var/lib/gems/2.3.0/cache/websocket-extensions-0.1.2.gem

Dependency Hierarchy: - rails-5.0.0.gem (Root Library) - actioncable-5.0.0.gem - websocket-driver-0.6.4.gem - :x: **websocket-extensions-0.1.2.gem** (Vulnerable Library)

Found in base branch: master

Vulnerability Details

websocket-extensions ruby module prior to 0.1.5 allows Denial of Service (DoS) via Regex Backtracking. The extension parser may take quadratic time when parsing a header containing an unclosed string parameter value whose content is a repeating two-byte sequence of a backslash and some other character. This could be abused by an attacker to conduct Regex Denial Of Service (ReDoS) on a single-threaded server by providing a malicious payload with the Sec-WebSocket-Extensions header.

Publish Date: 2020-06-02

URL: CVE-2020-7663

CVSS 3 Score Details (7.5)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7663

Release Date: 2020-09-17

Fix Resolution: websocket-extensions:0.1.5


Step up your Open Source Security Game with Mend here