Rapid7 Vulnerability & Exploit Database

FreeBSD: VID-CA8327F7-A5A5-11EA-A860-08002728F74C (CVE-2020-7663): websocket-extensions -- ReDoS vulnerability

Back to Search

FreeBSD: VID-CA8327F7-A5A5-11EA-A860-08002728F74C (CVE-2020-7663): websocket-extensions -- ReDoS vulnerability

Severity
5
CVSS
(AV:N/AC:L/Au:N/C:N/I:N/A:P)
Published
06/02/2020
Created
06/05/2020
Added
06/04/2020
Modified
10/20/2020

Description

websocket-extensions ruby module prior to 0.1.5 allows Denial of Service (DoS) via Regex Backtracking. The extension parser may take quadratic time when parsing a header containing an unclosed string parameter value whose content is a repeating two-byte sequence of a backslash and some other character. This could be abused by an attacker to conduct Regex Denial Of Service (ReDoS) on a single-threaded server by providing a malicious payload with the Sec-WebSocket-Extensions header.

Solution(s)

  • freebsd-upgrade-package-rubygem-websocket-extensions

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;