CVE-2020-7663Uncontrolled Resource Consumption in Project Websocket-extensions

Severity
7.5HIGHNVD
EPSS
2.4%
top 14.85%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJun 2
Latest updateSep 16

Description

websocket-extensions ruby module prior to 0.1.5 allows Denial of Service (DoS) via Regex Backtracking. The extension parser may take quadratic time when parsing a header containing an unclosed string parameter value whose content is a repeating two-byte sequence of a backslash and some other character. This could be abused by an attacker to conduct Regex Denial Of Service (ReDoS) on a single-threaded server by providing a malicious payload with the Sec-WebSocket-Extensions header.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages2 packages

Also affects: Debian Linux 9.0, Ubuntu Linux 16.04, 18.04, 20.04

Patches

🔴Vulnerability Details

5
OSV
ruby-websocket-extensions vulnerability2020-09-16
GHSA
Regular Expression Denial of Service in websocket-extensions (RubyGem)2020-06-05
OSV
Regular Expression Denial of Service in websocket-extensions (RubyGem)2020-06-05
CVEList
CVE-2020-7663: websocket-extensions ruby module prior to 02020-06-02
OSV
CVE-2020-7663: websocket-extensions ruby module prior to 02020-06-02

📋Vendor Advisories

3
Ubuntu
websocket-extensions vulnerability2020-09-16
Red Hat
rubygem-websocket-extensions: ReDoS vulnerability in Sec-WebSocket-Extensions parser2020-06-02
Debian
CVE-2020-7663: ruby-websocket-extensions - websocket-extensions ruby module prior to 0.1.5 allows Denial of Service (DoS) v...2020

💬Community

2
Bugzilla
CVE-2020-7663 rubygem-websocket-extensions: ReDoS vulnerability in Sec-WebSocket-Extensions parser [fedora-all]2020-06-10
Bugzilla
CVE-2020-7663 rubygem-websocket-extensions: ReDoS vulnerability in Sec-WebSocket-Extensions parser2020-06-10
CVE-2020-7663 — Uncontrolled Resource Consumption | cvebase