CVE-2023-22792
Description
A regular expression based DoS vulnerability in Action Dispatch <6.0.6.1,< 6.1.7.1, and <7.0.4.1. Specially crafted cookies, in combination with a specially crafted X_FORWARDED_HOST header can cause the regular expression engine to enter a state of catastrophic backtracking. This can cause the process to use large amounts of CPU and memory, leading to a possible DoS vulnerability All users running an affected release should either upgrade or use one of the workarounds immediately.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A ReDoS vulnerability in Action Dispatch allows a remote, unauthenticated attacker to cause a denial of service via specially crafted cookies and X_FORWARDED_HOST headers.
Vulnerability
CVE-2023-22792 is a regular expression denial-of-service (ReDoS) vulnerability in the Action Dispatch component of Ruby on Rails [1]. The flaw lies in the way Action Dispatch processes HTTP Cookie headers in combination with the X_FORWARDED_HOST header. When an attacker sends a specially crafted cookie value along with a malicious X_FORWARDED_HOST header, the regular expression engine enters a state of catastrophic backtracking [1]. This regex behavior causes the CPU and memory usage to spike, leading to a denial of service condition [1].
Attack
Vector and Prerequisites
The attack is exploitable remotely without authentication [1]. An attacker only needs to send a single HTTP request containing both a crafted cookie and a crafted X_FORWARDED_HOST header to a vulnerable Rails application [1]. No special network position is required; the attack can be delivered over the internet. The vulnerability is triggered during request processing, before any controller logic executes, meaning the application does not need to be in a specific state to be affected.
Impact
Successful exploitation results in high CPU and memory consumption on the target server, effectively causing a denial of service [1]. This can render the Rails application unresponsive to legitimate traffic, potentially affecting all users of the service. The impact is limited to availability; there is no evidence of data corruption or information disclosure from this vulnerability.
Mitigation
The vulnerability is fixed in Rails versions 6.0.6.1, 6.1.7.1, and 7.0.4.1 [3]. Users running any older version within the 6.0.x, 6.1.x, or 7.0.x series should upgrade immediately [3]. For those unable to upgrade, the official advisory recommends using a workaround, such as applying a monkey-patch or using a reverse proxy to sanitize the X_FORWARDED_HOST header [1][3].
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
actionpackRubyGems | >= 3.0.0, < 5.2.8.15 | 5.2.8.15 |
actionpackRubyGems | >= 6.0.0, < 6.1.7.1 | 6.1.7.1 |
actionpackRubyGems | >= 7.0.0, < 7.0.4.1 | 7.0.4.1 |
Affected products
10- Action Dispatch/Action Dispatchdescription
- ghsa-coords9 versionspkg:gem/actionpackpkg:rpm/opensuse/rubygem-actionpack-5_1&distro=openSUSE%20Leap%2015.4pkg:rpm/opensuse/rubygem-actionpack-7.0&distro=openSUSE%20Tumbleweedpkg:rpm/suse/rubygem-actionpack-4_2&distro=SUSE%20OpenStack%20Cloud%20Crowbar%208pkg:rpm/suse/rubygem-actionpack-4_2&distro=SUSE%20OpenStack%20Cloud%20Crowbar%209pkg:rpm/suse/rubygem-actionpack-5_1&distro=SUSE%20Linux%20Enterprise%20High%20Availability%20Extension%2015%20SP1pkg:rpm/suse/rubygem-actionpack-5_1&distro=SUSE%20Linux%20Enterprise%20High%20Availability%20Extension%2015%20SP2pkg:rpm/suse/rubygem-actionpack-5_1&distro=SUSE%20Linux%20Enterprise%20High%20Availability%20Extension%2015%20SP3pkg:rpm/suse/rubygem-actionpack-5_1&distro=SUSE%20Linux%20Enterprise%20High%20Availability%20Extension%2015%20SP4
>= 3.0.0, < 5.2.8.15+ 8 more
- (no CPE)range: >= 3.0.0, < 5.2.8.15
- (no CPE)range: < 5.1.4-150000.3.15.1
- (no CPE)range: < 7.0.4.1-1.1
- (no CPE)range: < 4.2.9-7.15.1
- (no CPE)range: < 4.2.9-7.15.1
- (no CPE)range: < 5.1.4-150000.3.15.1
- (no CPE)range: < 5.1.4-150000.3.15.1
- (no CPE)range: < 5.1.4-150000.3.15.1
- (no CPE)range: < 5.1.4-150000.3.15.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
9- github.com/advisories/GHSA-p84v-45xj-wwqjghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2023-22792ghsaADVISORY
- www.debian.org/security/2023/dsa-5372ghsavendor-advisoryWEB
- discuss.rubyonrails.org/t/cve-2023-22792-possible-redos-based-dos-vulnerability-in-action-dispatch/82115ghsaWEB
- github.com/rails/rails/releases/tag/v7.0.4.1ghsaWEB
- github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2023-22792.ymlghsaWEB
- rubyonrails.org/2023/1/17/Rails-Versions-6-0-6-1-6-1-7-1-7-0-4-1-have-been-releasedghsaWEB
- security.netapp.com/advisory/ntap-20240202-0007ghsaWEB
- security.netapp.com/advisory/ntap-20240202-0007/mitre
News mentions
0No linked articles in our index yet.