Bug 1172445 (CVE-2020-7663) - VUL-1: CVE-2020-7663: rubygem-websocket-extensions: Denial of Service (DoS) via Regex Backtracking
Summary: VUL-1: CVE-2020-7663: rubygem-websocket-extensions: Denial of Service (DoS) v...
Status: RESOLVED FIXED
Alias: CVE-2020-7663
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P4 - Low : Normal
Target Milestone: ---
Assignee: Security Team bot
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/260480/
Whiteboard: CVSSv3.1:SUSE:CVE-2020-7663:4.3:(AV:N...
Keywords:
Depends on:
Blocks:
 
Reported: 2020-06-03 11:23 UTC by Wolfgang Frisch
Modified: 2024-05-22 14:31 UTC (History)
3 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Wolfgang Frisch 2020-06-03 11:23:58 UTC
CVE-2020-7663

The websocket-extensions ruby module prior to 0.1.5 allows Denial of Service (DoS)
via Regex Backtracking. The extension parser may take quadratic time when
parsing a header containing an unclosed string parameter value whose content is
a repeating two-byte sequence of a backslash and some other character. This
could be abused by an attacker to conduct Regex Denial Of Service (ReDoS) on a
single-threaded server by providing a malicious payload with the
Sec-WebSocket-Extensions header.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-7663
http://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-7663.html
https://github.com/faye/websocket-extensions-ruby/commit/aa156a439da681361ed6f53f1a8131892418838b
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7663
https://github.com/faye/websocket-extensions-ruby/security/advisories/GHSA-g6wq-qcwm-j5g2
https://blog.jcoglan.com/2020/06/02/redos-vulnerability-in-websocket-extensions
https://snyk.io/vuln/SNYK-RUBY-WEBSOCKETEXTENSIONS-570830
Comment 1 Cathy Hu 2023-01-11 15:21:43 UTC
Reassigning to coldpool as current bugowner
Comment 2 Petr Gajdos 2023-01-12 13:23:30 UTC
Submitted for 15/rubygem-websocket-extensions. I believe all fixed.
Comment 4 Swamp Workflow Management 2023-01-24 17:20:14 UTC
SUSE-SU-2023:0127-1: An update that fixes one vulnerability is now available.

Category: security (moderate)
Bug References: 1172445
CVE References: CVE-2020-7663
JIRA References: 
Sources used:
openSUSE Leap 15.4 (src):    rubygem-websocket-extensions-0.1.3-150000.3.4.1
SUSE Linux Enterprise High Availability 15-SP4 (src):    rubygem-websocket-extensions-0.1.3-150000.3.4.1
SUSE Linux Enterprise High Availability 15-SP3 (src):    rubygem-websocket-extensions-0.1.3-150000.3.4.1
SUSE Linux Enterprise High Availability 15-SP2 (src):    rubygem-websocket-extensions-0.1.3-150000.3.4.1
SUSE Linux Enterprise High Availability 15-SP1 (src):    rubygem-websocket-extensions-0.1.3-150000.3.4.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 5 Andrea Mattiazzo 2024-05-22 14:31:21 UTC
All done, closing.