Severity
7.5HIGHNVD
EPSS
12.1%
top 6.17%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 27

Description

There is a possible denial of service vulnerability in Action View (Rails) <5.2.2.1, <5.1.6.2, <5.0.7.2, <4.2.11.1 where specially crafted accept headers can cause action view to consume 100% cpu and make the server unresponsive.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages7 packages

RubyGemsrails/actionview4.0.04.2.11.1+4
NVDrubyonrails/rails5.0.05.0.7.2+3
Debianrubyonrails/rails< 2:5.2.2.1+dfsg-1+3
CVEListV5rails/https_github.com_rails_rails4 versions+3
NVDopensuse/leap15.0, 15.1+1

Also affects: Debian Linux 8.0, Fedora 30

Patches

🔴Vulnerability Details

4
CVEList
CVE-2019-5419: There is a possible denial of service vulnerability in Action View (Rails) <52019-03-27
OSV
CVE-2019-5419: There is a possible denial of service vulnerability in Action View (Rails) <52019-03-27
OSV
Denial of Service Vulnerability in Action View2019-03-13
GHSA
Denial of Service Vulnerability in Action View2019-03-13

📋Vendor Advisories

2
Red Hat
rubygem-actionpack: denial of service vulnerability in Action View2019-03-13
Debian
CVE-2019-5419: rails - There is a possible denial of service vulnerability in Action View (Rails) <5.2....2019

💬Community

2
Bugzilla
CVE-2019-5419 rubygem-actionpack: denial of service vulnerability in Action View2019-03-15
Bugzilla
CVE-2019-5418 CVE-2019-5419 rubygem-actionview: various flaws [fedora-all]2019-03-15
CVE-2019-5419 — Uncontrolled Resource Consumption | cvebase