The PostgreSQL adapter in Active Record before 6.1.2.1, 6.0.3.5, 5.2.4.5 suffers from a regular expression denial of service (REDoS) vulnerability. Carefully crafted input can cause the input validation in the `money` type of the PostgreSQL adapter in Active Record to spend too much time in a regular expression, resulting in the potential for a DoS attack. This only impacts Rails applications that are using PostgreSQL along with money type columns that take user input.
References
Link | Resource |
---|---|
https://hackerone.com/reports/1023899 | Exploit Patch Third Party Advisory |
https://discuss.rubyonrails.org/t/cve-2021-22880-possible-dos-vulnerability-in-active-record-postgresql-adapter/77129 | Mitigation Patch Vendor Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XQ3NS4IBYE2I3MVMGAHFZBZBIZGHXHT3/ | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MO5OJ3F4ZL3UXVLJO6ECANRVZBNRS2IH/ | Mailing List Third Party Advisory |
https://www.debian.org/security/2021/dsa-4929 | Third Party Advisory |
https://security.netapp.com/advisory/ntap-20210805-0009/ | Third Party Advisory |
Information
Published : 2021-02-11 10:15
Updated : 2022-01-04 08:38
NVD link : CVE-2021-22880
Mitre link : CVE-2021-22880
JSON object : View
CWE
CWE-400
Uncontrolled Resource Consumption
Products Affected
rubyonrails
- rails
fedoraproject
- fedora