-
CVSS Score
-Basic Information
CVE ID
-
GHSA ID
-
EPSS Score
-
CWE
-
Published
-
Updated
-
KEV Status
-
Technology
-
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| rack | rubygems | >= 3.0.0, < 3.0.9.1 | 3.0.9.1 |
| rack | rubygems | >= 0.4, < 2.2.8.1 | 2.2.8.1 |
The vulnerability stems from the SPLIT_PATTERN regex (%r{\s*[;,]\s*}) used in MediaType class methods. Both type() and params() methods utilize this regex for splitting operations. The regex's \s* quantifiers on both sides of [;,] create a 2nd degree polynomial ReDoS vulnerability when processing inputs with long whitespace prefixes. The commit patching this vulnerability specifically modifies these two methods to use a simpler regex and handle whitespace stripping manually, confirming their involvement in the vulnerability.
KEV Misses 88% of Exploited CVEs- Get the report