-
CVSS Score
-Basic Information
CVE ID
-
GHSA ID
-
EPSS Score
-
CWE
-
Published
-
Updated
-
KEV Status
-
Technology
-
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| rack | rubygems | >= 2.0.0, < 2.2.6.4 | 2.2.6.4 |
| rack | rubygems | >= 3.0.0, < 3.0.6.1 | 3.0.6.1 |
The GitHub commit 231ef369ad0b542575fb36c74fcfcfabcf6c530c shows the vulnerability was fixed by replacing regex-based header splitting with simple string splitting followed by stripping. The original code in parse_http_accept_header used regex patterns that could be exploited for ReDoS. The CVE description explicitly mentions header parsing as the attack vector, and the patch directly modifies this function's logic.
KEV Misses 88% of Exploited CVEs- Get the report