gsd-2022-23837
Vulnerability from gsd
Modified
2022-01-27 00:00
Details
In api.rb in Sidekiq before 5.2.10 and 6.4.0, there is no limit on the number of
days when requesting stats for the graph. This overloads the system, affecting the
Web UI, and makes it unavailable to users.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2022-23837", "description": "In api.rb in Sidekiq before 6.4.0, there is no limit on the number of days when requesting stats for the graph. This overloads the system, affecting the Web UI, and makes it unavailable to users.", "id": "GSD-2022-23837", "references": [ "https://access.redhat.com/errata/RHSA-2022:5498" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "affected": [ { "package": { "ecosystem": "RubyGems", "name": "sidekiq", "purl": "pkg:gem/sidekiq" } } ], "aliases": [ "CVE-2022-23837", "GHSA-jrfj-98qg-qjgv" ], "details": "In api.rb in Sidekiq before 5.2.10 and 6.4.0, there is no limit on the number of\ndays when requesting stats for the graph. This overloads the system, affecting the\nWeb UI, and makes it unavailable to users.\n", "id": "GSD-2022-23837", "modified": "2022-01-27T00:00:00.000Z", "published": "2022-01-27T00:00:00.000Z", "references": [ { "type": "WEB", "url": "https://github.com/mperham/sidekiq/commit/7785ac1399f1b28992adb56055f6acd88fd1d956" }, { "type": "WEB", "url": "https://github.com/TUTUMSPACE/exploits/blob/main/sidekiq.md" } ], "schema_version": "1.4.0", "severity": [ { "score": 5.0, "type": "CVSS_V2" }, { "score": 7.5, "type": "CVSS_V3" } ], "summary": "Denial of service in sidekiq" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2022-23837", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In api.rb in Sidekiq before 5.2.10 and 6.4.0, there is no limit on the number of days when requesting stats for the graph. This overloads the system, affecting the Web UI, and makes it unavailable to users." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/mperham/sidekiq/commit/7785ac1399f1b28992adb56055f6acd88fd1d956", "refsource": "MISC", "url": "https://github.com/mperham/sidekiq/commit/7785ac1399f1b28992adb56055f6acd88fd1d956" }, { "name": "https://github.com/TUTUMSPACE/exploits/blob/main/sidekiq.md", "refsource": "MISC", "url": "https://github.com/TUTUMSPACE/exploits/blob/main/sidekiq.md" }, { "name": "https://github.com/rubysec/ruby-advisory-db/pull/495", "refsource": "MISC", "url": "https://github.com/rubysec/ruby-advisory-db/pull/495" }, { "name": "[debian-lts-announce] 20220310 [SECURITY] [DLA 2943-1] ruby-sidekiq security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00015.html" }, { "name": "[debian-lts-announce] 20230312 [SECURITY] [DLA 3360-1] ruby-sidekiq security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2023/03/msg00011.html" } ] } }, "github.com/rubysec/ruby-advisory-db": { "cve": "2022-23837", "cvss_v2": 5.0, "cvss_v3": 7.5, "date": "2022-01-27", "description": "In api.rb in Sidekiq before 5.2.10 and 6.4.0, there is no limit on the number of\ndays when requesting stats for the graph. This overloads the system, affecting the\nWeb UI, and makes it unavailable to users.\n", "gem": "sidekiq", "ghsa": "jrfj-98qg-qjgv", "patched_versions": [ "\u003e= 6.4.0", "~\u003e 5.2.10" ], "related": { "url": [ "https://github.com/TUTUMSPACE/exploits/blob/main/sidekiq.md" ] }, "title": "Denial of service in sidekiq", "url": "https://github.com/mperham/sidekiq/commit/7785ac1399f1b28992adb56055f6acd88fd1d956" }, "gitlab.com": { "advisories": [ { "affected_range": "\u003c5.2.10||\u003e=6.0.0 \u003c6.4.0", "affected_versions": "All versions before 5.2.10, all versions starting from 6.0.0 before 6.4.0", "cvss_v2": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "cvss_v3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cwe_ids": [ "CWE-1035", "CWE-770", "CWE-937" ], "date": "2023-03-13", "description": "In api.rb in Sidekiq, there is no limit on the number of days when requesting stats for the graph. This overloads the system, affecting the Web UI, and makes it unavailable to users.", "fixed_versions": [ "5.2.10", "6.4.0" ], "identifier": "CVE-2022-23837", "identifiers": [ "CVE-2022-23837" ], "not_impacted": "All versions starting from 5.2.10 before 6.0.0, all versions starting from 6.4.0", "package_slug": "gem/sidekiq", "pubdate": "2022-01-21", "solution": "Upgrade to versions 5.2.10, 6.4.0 or above.", "title": "Allocation of Resources Without Limits or Throttling", "urls": [ "https://nvd.nist.gov/vuln/detail/CVE-2022-23837", "https://github.com/mperham/sidekiq/commit/7785ac1399f1b28992adb56055f6acd88fd1d956", "https://github.com/TUTUMSPACE/exploits/blob/main/sidekiq.md" ], "uuid": "2a68d39f-3108-470b-a430-33efdcfd458b" } ] }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:contribsys:sidekiq:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "5.2.10", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:contribsys:sidekiq:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "6.4.0", "versionStartIncluding": "6.0.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2022-23837" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "In api.rb in Sidekiq before 5.2.10 and 6.4.0, there is no limit on the number of days when requesting stats for the graph. This overloads the system, affecting the Web UI, and makes it unavailable to users." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-770" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/mperham/sidekiq/commit/7785ac1399f1b28992adb56055f6acd88fd1d956", "refsource": "MISC", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/mperham/sidekiq/commit/7785ac1399f1b28992adb56055f6acd88fd1d956" }, { "name": "https://github.com/TUTUMSPACE/exploits/blob/main/sidekiq.md", "refsource": "MISC", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/TUTUMSPACE/exploits/blob/main/sidekiq.md" }, { "name": "https://github.com/rubysec/ruby-advisory-db/pull/495", "refsource": "MISC", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/rubysec/ruby-advisory-db/pull/495" }, { "name": "[debian-lts-announce] 20220310 [SECURITY] [DLA 2943-1] ruby-sidekiq security update", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00015.html" }, { "name": "[debian-lts-announce] 20230312 [SECURITY] [DLA 3360-1] ruby-sidekiq security update", "refsource": "MLIST", "tags": [], "url": "https://lists.debian.org/debian-lts-announce/2023/03/msg00011.html" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6 } }, "lastModifiedDate": "2023-03-13T00:15Z", "publishedDate": "2022-01-21T21:15Z" } } }
Loading...
Loading...
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.