Skip to content

Commit 290ee74

Browse files
jasnowRubySec CI
authored and
RubySec CI
committed
Updated advisory posts against rubysec/ruby-advisory-db@4b6766f
1 parent 61e4f1f commit 290ee74

File tree

3 files changed

+134
-0
lines changed

3 files changed

+134
-0
lines changed
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,43 @@
1+
---
2+
layout: advisory
3+
title: 'CVE-2025-27219 (cgi): CVE-2025-27219 - Denial of Service in CGI::Cookie.parse'
4+
comments: false
5+
categories:
6+
- cgi
7+
advisory:
8+
gem: cgi
9+
cve: 2025-27219
10+
url: https://www.cve.org/CVERecord?id=CVE-2025-27219
11+
title: CVE-2025-27219 - Denial of Service in CGI::Cookie.parse
12+
date: 2025-02-26
13+
description: |
14+
There is a possibility for DoS by in the cgi gem.
15+
This vulnerability has been assigned the CVE identifier
16+
CVE-2025-27219. We recommend upgrading the cgi gem.
17+
18+
## Details
19+
20+
CGI::Cookie.parse took super-linear time to parse a cookie string
21+
in some cases. Feeding a maliciously crafted cookie string into
22+
the method could lead to a Denial of Service.
23+
24+
Please update CGI gem to version 0.3.5.1, 0.3.7, 0.4.2 or later.
25+
26+
## Affected versions
27+
28+
cgi gem versions <= 0.3.5, 0.3.6, 0.4.0 and 0.4.1.
29+
30+
## Credits
31+
32+
Thanks to lio346 for discovering this issue.
33+
Also thanks to mame for fixing this vulnerability.
34+
patched_versions:
35+
- "~> 0.3.5.1"
36+
- "~> 0.3.7"
37+
- ">= 0.4.2"
38+
related:
39+
url:
40+
- https://www.cve.org/CVERecord?id=CVE-2025-27219
41+
- https://www.suse.com/security/cve/CVE-2025-27219.html
42+
- https://www.ruby-lang.org/en/news/2025/02/26/security-advisories
43+
---
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,43 @@
1+
---
2+
layout: advisory
3+
title: 'CVE-2025-27220 (cgi): CVE-2025-27220 - ReDoS in CGI::Util#escapeElement.'
4+
comments: false
5+
categories:
6+
- cgi
7+
advisory:
8+
gem: cgi
9+
cve: 2025-27220
10+
url: https://www.cve.org/CVERecord?id=CVE-2025-27220
11+
title: CVE-2025-27220 - ReDoS in CGI::Util#escapeElement.
12+
date: 2025-02-26
13+
description: |
14+
There is a possibility for Regular expression Denial of Service (ReDoS)
15+
by in the cgi gem. This vulnerability has been assigned the CVE
16+
identifier CVE-2025-27220. We recommend upgrading the cgi gem.
17+
18+
## Details
19+
20+
The regular expression used in CGI::Util#escapeElement is vulnerable
21+
to ReDoS. The crafted input could lead to a high CPU consumption.
22+
23+
This vulnerability only affects Ruby 3.1 and 3.2. If you
24+
are using these versions, please update CGI gem to version
25+
0.3.5.1, 0.3.7, 0.4.2 or later.
26+
27+
## Affected versions
28+
29+
cgi gem versions <= 0.3.5, 0.3.6, 0.4.0 and 0.4.1.
30+
31+
## Credits
32+
33+
Thanks to svalkanov for discovering this issue.
34+
Also thanks to nobu for fixing this vulnerability.
35+
patched_versions:
36+
- "~> 0.3.5.1"
37+
- "~> 0.3.7"
38+
- ">= 0.4.2"
39+
related:
40+
url:
41+
- https://www.cve.org/CVERecord?id=CVE-2025-27220
42+
- https://www.ruby-lang.org/en/news/2025/02/26/security-advisories
43+
---
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,48 @@
1+
---
2+
layout: advisory
3+
title: 'CVE-2025-27221 (uri): CVE-2025-27221 - userinfo leakage in URI#join, URI#merge
4+
and URI#+.'
5+
comments: false
6+
categories:
7+
- uri
8+
advisory:
9+
gem: uri
10+
cve: 2025-27221
11+
url: https://www.cve.org/CVERecord?id=CVE-2025-27221
12+
title: CVE-2025-27221 - userinfo leakage in URI#join, URI#merge and URI#+.
13+
date: 2025-02-26
14+
description: |2
15+
16+
There is a possibility for userinfo leakage by in the uri gem.
17+
This vulnerability has been assigned the CVE identifier
18+
CVE-2025-27221. We recommend upgrading the uri gem.
19+
20+
## Details
21+
22+
The methods URI#join, URI#merge, and URI#+ retained userinfo, such
23+
as user:password, even after the host is replaced. When generating
24+
a URL to a malicious host from a URL containing secret userinfo
25+
using these methods, and having someone access that URL, an
26+
unintended userinfo leak could occur.
27+
28+
Please update URI gem to version 0.11.3, 0.12.4, 0.13.2, 1.0.3 or later.
29+
30+
## Affected versions
31+
32+
uri gem versions < 0.11.3, 0.12.0 to 0.12.3, 0.13.0, 0.13.1 and
33+
1.0.0 to 1.0.2.
34+
35+
## Credits
36+
37+
Thanks to Tsubasa Irisawa (lambdasawa) for discovering this issue.
38+
Also thanks to nobu for additional fixes of this vulnerability.
39+
patched_versions:
40+
- "~> 0.11.3"
41+
- "~> 0.12.4"
42+
- "~> 0.13.2"
43+
- ">= 1.0.3"
44+
related:
45+
url:
46+
- https://www.cve.org/CVERecord?id=CVE-2025-27221
47+
- https://www.ruby-lang.org/en/news/2025/02/26/security-advisories
48+
---

0 commit comments

Comments
 (0)