encoded_id-rails versions before 1.0.0.beta2 are affected by an uncontrolled resource consumption vulnerability. A remote and unauthenticated attacker might cause a denial of service condition by sending an HTTP request with an extremely long "id" parameter.
References
Link | Resource |
---|---|
https://github.com/advisories/GHSA-3px7-jm2p-6h2c | Exploit Third Party Advisory |
https://github.com/stevegeek/encoded_id-rails/commit/afa495a77b8a21ad582611f9cdc2081dc4018b91 | Patch |
https://github.com/stevegeek/encoded_id-rails/security/advisories/GHSA-3px7-jm2p-6h2c | Exploit Vendor Advisory |
https://vulncheck.com/advisories/vc-advisory-GHSA-3px7-jm2p-6h2c | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: VulnCheck
Published: 2024-01-04T20:48:00.606Z
Updated: 2024-01-04T20:48:00.606Z
Reserved: 2024-01-04T18:44:55.210Z
Link: CVE-2024-0241
JSON object: View
NVD Information
Status : Analyzed
Published: 2024-01-04T21:15:09.267
Modified: 2024-01-10T15:11:15.457
Link: CVE-2024-0241
JSON object: View
Redhat Information
No data.