Loading HuntDB...

GHSA-x76w-6vjr-8xgj

GitHub Security Advisory

Possible ReDoS vulnerability in query parameter filtering in Action Dispatch

✓ GitHub Reviewed MODERATE Has CVE

Advisory Details

There is a possible ReDoS vulnerability in the query parameter filtering routines of Action Dispatch. This vulnerability has been assigned the CVE identifier CVE-2024-41128.

Impact
------

Carefully crafted query parameters can cause query parameter filtering to take an unexpected amount of time, possibly resulting in a DoS vulnerability. All users running an affected release should either upgrade or apply the relevant patch immediately.

Ruby 3.2 has mitigations for this problem, so Rails applications using Ruby 3.2 or newer are unaffected. Rails 8.0.0.beta1 depends on Ruby 3.2 or greater so is unaffected.

Releases
--------
The fixed releases are available at the normal locations.

Workarounds
-----------
Users on Ruby 3.2 are unaffected by this issue.

Credits
-------

Thanks to [scyoon](https://hackerone.com/scyoon) for the report and patches!

Affected Packages

RubyGems actionpack
Affected versions: 3.1.0 (fixed in 6.1.7.9)
RubyGems actionpack
Affected versions: 7.0.0 (fixed in 7.0.8.5)
RubyGems actionpack
Affected versions: 7.1.0 (fixed in 7.1.4.1)
RubyGems actionpack
Affected versions: 7.2.0 (fixed in 7.2.1.1)

Related CVEs

Key Information

GHSA ID
GHSA-x76w-6vjr-8xgj
Published
October 15, 2024 11:35 PM
Last Modified
October 31, 2024 7:33 PM
CVSS Score
5.0 /10
Primary Ecosystem
RubyGems
Primary Package
actionpack
GitHub Reviewed
✓ Yes

Dataset

Last updated: July 26, 2025 6:37 AM

Data from GitHub Advisory Database. This information is provided for research and educational purposes.