CVE Vulnerabilities

CVE-2021-41817

Inefficient Regular Expression Complexity

Published: Jan 01, 2022 | Modified: Nov 21, 2024
CVSS 3.x
7.5
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS 2.x
5 MEDIUM
AV:N/AC:L/Au:N/C:N/I:N/A:P
RedHat/V2
RedHat/V3
7.5 MODERATE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

Date.parse in the date gem through 3.2.0 for Ruby allows ReDoS (regular expression Denial of Service) via a long string. The fixed versions are 3.2.1, 3.1.2, 3.0.2, and 2.0.1.

Weakness

The product uses a regular expression with an inefficient, possibly exponential worst-case computational complexity that consumes excessive CPU cycles.

Affected Software

NameVendorStart VersionEnd Version
DateRuby-lang*2.0.1 (excluding)
DateRuby-lang3.0.0 (including)3.0.2 (excluding)
DateRuby-lang3.1.0 (including)3.1.2 (excluding)
DateRuby-lang3.2.0 (including)3.2.0 (including)
RubyRuby-lang2.6.0 (including)2.6.9 (excluding)
RubyRuby-lang2.7.0 (including)2.7.5 (excluding)
RubyRuby-lang3.0.0 (including)3.0.3 (excluding)
Red Hat Enterprise Linux 8RedHatruby:2.6-8050020211215144356.c5368500*
Red Hat Enterprise Linux 8RedHatruby:2.5-8060020220715152618.ad008a3a*
Red Hat Enterprise Linux 8RedHatruby:2.7-8060020220728151401.ad008a3a*
Red Hat Enterprise Linux 8RedHatruby:3.0-8060020220810162001.ad008a3a*
Red Hat Enterprise Linux 8.1 Update Services for SAP SolutionsRedHatruby:2.6-8010020220201152941.c27ad7f8*
Red Hat Enterprise Linux 8.2 Extended Update SupportRedHatruby:2.6-8020020220201131207.4cda2c84*
Red Hat Enterprise Linux 8.4 Extended Update SupportRedHatruby:2.6-8040020220131135901.522a0ee4*
Red Hat Software Collections for Red Hat Enterprise Linux 7RedHatrh-ruby26-ruby-0:2.6.9-120.el7*
Red Hat Software Collections for Red Hat Enterprise Linux 7RedHatrh-ruby30-ruby-0:3.0.4-149.el7*
Red Hat Software Collections for Red Hat Enterprise Linux 7RedHatrh-ruby27-ruby-0:2.7.6-131.el7*
Ruby2.3Ubuntuesm-infra/xenial*
Ruby2.3Ubuntutrusty*
Ruby2.3Ubuntuxenial*
Ruby2.5Ubuntubionic*
Ruby2.5Ubuntuesm-infra/bionic*
Ruby2.5Ubuntutrusty*
Ruby2.5Ubuntuxenial*
Ruby2.7Ubuntuesm-infra/focal*
Ruby2.7Ubuntufocal*
Ruby2.7Ubuntuhirsute*
Ruby2.7Ubuntuimpish*
Ruby2.7Ubuntutrusty*
Ruby2.7Ubuntuxenial*
Ruby3.0Ubuntudevel*
Ruby3.0Ubuntujammy*
Ruby3.0Ubuntutrusty*
Ruby3.0Ubuntuxenial*

Extended Description

	  Attackers can create crafted inputs that
	  intentionally cause the regular expression to use
	  excessive backtracking in a way that causes the CPU
	  consumption to spike.

Potential Mitigations

References