Skip to content

Rack Gem Subject to Denial of Service via Hash Collisions

Moderate severity GitHub Reviewed Published May 17, 2022 to the GitHub Advisory Database • Updated Aug 25, 2023

Package

maven org.jruby:jruby-parent (Maven)

Affected versions

< 1.6.5.1

Patched versions

1.6.5.1
bundler rack (RubyGems)
< 1.1.3
>= 1.2.0, < 1.2.5
>= 1.3.0, < 1.3.6
1.1.3
1.2.5
1.3.6
Published by the National Vulnerability Database Dec 30, 2011
Published to the GitHub Advisory Database May 17, 2022
Reviewed Mar 27, 2023
Last updated Aug 25, 2023

Severity

Moderate

EPSS score

Exploit Prediction Scoring System (EPSS)

This score estimates the probability of this vulnerability being exploited within the next 30 days. Data provided by FIRST.
(79th percentile)

Weaknesses

Use of Weak Hash

The product uses an algorithm that produces a digest (output value) that does not meet security expectations for a hash function that allows an adversary to reasonably determine the original input (preimage attack), find another input that can produce the same hash (2nd preimage attack), or find multiple inputs that evaluate to the same hash (birthday attack). Learn more on MITRE.

Uncontrolled Resource Consumption

The product does not properly control the allocation and maintenance of a limited resource, thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources. Learn more on MITRE.

CVE ID

CVE-2011-5036

GHSA ID

GHSA-v6j3-7jrw-hq2p

Source code

No known source code
Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.