CVE-2023-36617
Ruby vulnerability analysis and mitigation

Overview

A ReDoS (Regular Expression Denial of Service) vulnerability was discovered in the URI component for Ruby, tracked as CVE-2023-36617. The vulnerability affects versions before 0.12.2 and was disclosed on June 29, 2023. The issue exists due to the URI parser mishandling invalid URLs containing specific characters, which was an incomplete fix for a previous vulnerability (CVE-2023-28755) (Ruby Lang).

Technical details

The vulnerability manifests as an increase in execution time when parsing strings to URI objects, specifically in the rfc2396parser.rb and rfc3986parser.rb components. The issue has been assigned a CVSS v3.1 base score of 5.3 (Medium) with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L, indicating it can be exploited remotely with low attack complexity and requires no privileges or user interaction (NVD).

Impact

Successful exploitation of this vulnerability could lead to Denial of Service (DoS) conditions. The vulnerability affects the availability of the system by causing increased execution time when processing specially crafted URLs (NetApp Advisory).

Mitigation and workarounds

Users are recommended to update to URI gem version 0.12.2 or 0.10.3 depending on their Ruby version. For Ruby 3.0, update to URI 0.10.3; for Ruby 3.1 and 3.2, update to URI 0.12.2. Alternatively, Ruby 3.2 users can update to Ruby 3.2.3. The updates can be applied using 'gem update uri' or by adding the appropriate version requirement to the Gemfile (Ruby Lang).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management