Sha256: 4d6b59a88cc44dc2ced39febd17454092d5ad2cac7f4d6660cc4f5a37827fa06
Contents?: true
Size: 786 Bytes
Versions: 1
Compression:
Stored size: 786 Bytes
Contents
--- gem: user_agent_parser cve: 2020-5243 ghsa: pcqq-5962-hvcw url: https://github.com/ua-parser/uap-ruby/security/advisories/GHSA-pcqq-5962-hvcw date: 2020-03-10 title: Denial of Service in uap-core when processing crafted User-Agent strings description: |- ### Impact Some regexes are vulnerable to regular expression denial of service (REDoS) due to overlapping capture groups. This allows remote attackers to overload a server by setting the User-Agent header in an HTTP(S) request to maliciously crafted long strings. ### Patches Please update `uap-ruby` to >= v2.6.0 ### For more information https://github.com/ua-parser/uap-core/security/advisories/GHSA-cmcx-xhr8-3w9p cvss_v3: 5.7 patched_versions: - ">= 2.6.0" related: ghsa: - cmcx-xhr8-3w9p
Version data entries
1 entries across 1 versions & 1 rubygems
Version | Path |
---|---|
bundler-audit-0.7.0.1 | data/ruby-advisory-db/gems/user_agent_parser/CVE-2020-5243.yml |