mirror of
https://github.com/0xMarcio/cve.git
synced 2026-05-15 15:58:01 +02:00
21 lines
1.2 KiB
Markdown
21 lines
1.2 KiB
Markdown
### [CVE-2020-7663](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7663)
|
|
&color=blue)
|
|

|
|
&color=brighgreen)
|
|
|
|
### Description
|
|
|
|
websocket-extensions ruby module prior to 0.1.5 allows Denial of Service (DoS) via Regex Backtracking. The extension parser may take quadratic time when parsing a header containing an unclosed string parameter value whose content is a repeating two-byte sequence of a backslash and some other character. This could be abused by an attacker to conduct Regex Denial Of Service (ReDoS) on a single-threaded server by providing a malicious payload with the Sec-WebSocket-Extensions header.
|
|
|
|
### POC
|
|
|
|
#### Reference
|
|
- https://snyk.io/vuln/SNYK-RUBY-WEBSOCKETEXTENSIONS-570830
|
|
|
|
#### Github
|
|
- https://github.com/ARPSyndicate/cvemon
|
|
- https://github.com/Live-Hack-CVE/CVE-2020-7663
|
|
- https://github.com/PalindromeLabs/awesome-websocket-security
|
|
- https://github.com/upsideon/shoveler
|
|
|