encoded_id-rails versions before 1.0.0.beta2 are affected by an uncontrolled resource consumption vulnerability. A remote and unauthenticated attacker might cause a denial of service condition by sending an HTTP request with an extremely long "id" parameter.
References
Link | Resource |
---|---|
https://github.com/advisories/GHSA-3px7-jm2p-6h2c | Exploit Third Party Advisory |
https://github.com/stevegeek/encoded_id-rails/commit/afa495a77b8a21ad582611f9cdc2081dc4018b91 | Patch |
https://github.com/stevegeek/encoded_id-rails/security/advisories/GHSA-3px7-jm2p-6h2c | Exploit Vendor Advisory |
https://vulncheck.com/advisories/vc-advisory-GHSA-3px7-jm2p-6h2c | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2024-01-04 21:15
Updated : 2024-01-10 15:11
NVD link : CVE-2024-0241
Mitre link : CVE-2024-0241
CVE.ORG link : CVE-2024-0241
JSON object : View
Products Affected
diaconou
- encodedid\