{"id":"CVE-2023-22792","details":"A regular expression based DoS vulnerability in Action Dispatch \u003c6.0.6.1,\u003c 6.1.7.1, and \u003c7.0.4.1. Specially crafted cookies, in combination with a specially crafted X_FORWARDED_HOST header can cause the regular expression engine to enter a state of catastrophic backtracking. This can cause the process to use large amounts of CPU and memory, leading to a possible DoS vulnerability All users running an affected release should either upgrade or use one of the workarounds immediately.","aliases":["GHSA-p84v-45xj-wwqj"],"modified":"2026-04-10T04:55:28.433735Z","published":"2023-02-09T20:15:11.290Z","related":["SUSE-SU-2023:0442-1","SUSE-SU-2023:0444-1","openSUSE-SU-2024:12765-1","openSUSE-SU-2024:14067-1","openSUSE-SU-2025:15110-1"],"references":[{"type":"ADVISORY","url":"https://www.debian.org/security/2023/dsa-5372"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20240202-0007/"},{"type":"FIX","url":"https://discuss.rubyonrails.org/t/cve-2023-22792-possible-redos-based-dos-vulnerability-in-action-dispatch/82115"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/rails/rails","events":[{"introduced":"9891ca89c69732a21743f0349f2995956a7802e7"},{"fixed":"28bb76d3efc39b2ef663dfe2346f7c2621343cd6"},{"introduced":"914caca2d31bd753f47f9168f2a375921d9e91cc"},{"fixed":"c443466a99f8ed951605fb4993a01de5e41349a4"},{"introduced":"984c3ef2775781d47efa9f541ce570daa2434a80"},{"fixed":"23e0345fe900dfd7edd6e8e5a7a6bd54b2a7d2ed"}],"database_specific":{"versions":[{"introduced":"3.0.0"},{"fixed":"6.0.6.1"},{"introduced":"6.1.0"},{"fixed":"6.1.7.1"},{"introduced":"7.0.0"},{"fixed":"7.0.4.1"}]}}],"versions":["v6.1.0","v6.1.1","v6.1.2","v6.1.3","v6.1.4","v6.1.5","v6.1.7","v7.0.0","v7.0.1","v7.0.2","v7.0.3","v7.0.4"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-22792.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}