CVE-2024-26142

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-26142
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-26142.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-26142
Aliases
Downstream
Published
2024-02-27T15:25:44Z
Modified
2025-10-22T18:41:34.751918Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
Rails possible ReDoS vulnerability in Accept header parsing in Action Dispatch
Details

Rails is a web-application framework. Starting in version 7.1.0, there is a possible ReDoS vulnerability in the Accept header parsing routines of Action Dispatch. This vulnerability is patched in 7.1.3.1. Ruby 3.2 has mitigations for this problem, so Rails applications using Ruby 3.2 or newer are unaffected.

Database specific
{
    "cwe_ids": [
        "CWE-1333"
    ]
}
References

Affected packages

Git / github.com/rails/rails

Affected ranges

Type
GIT
Repo
https://github.com/rails/rails
Events

Affected versions

v7.*

v7.1.0
v7.1.1
v7.1.2
v7.1.3