-
CVSS Score
-Basic Information
CVE ID
-
GHSA ID
-
EPSS Score
-
CWE
-
Published
-
Updated
-
KEV Status
-
Technology
-
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| actionpack | rubygems | >= 7.1.0, < 7.1.3.1 | 7.1.3.1 |
The vulnerability stems from the PARAMETER_SEPARATOR_REGEXP regex pattern in the MIME type parsing logic. The original regex (/\s*;\sq="?/) contained a \s quantifier that permitted unlimited whitespace before semicolons. This could be exploited by crafted Accept headers with excessive whitespace to trigger ReDoS. The patch removes the leading \s* and adds .strip to mitigate this. The parse method in MimeType directly handles Accept header parsing and uses this regex, making it the clear vulnerable function.
KEV Misses 88% of Exploited CVEs- Get the report