VYPR
Low severityNVD Advisory· Published Feb 9, 2023· Updated Mar 24, 2025

CVE-2023-22792

CVE-2023-22792

Description

A regular expression based DoS vulnerability in Action Dispatch <6.0.6.1,< 6.1.7.1, and <7.0.4.1. Specially crafted cookies, in combination with a specially crafted X_FORWARDED_HOST header can cause the regular expression engine to enter a state of catastrophic backtracking. This can cause the process to use large amounts of CPU and memory, leading to a possible DoS vulnerability All users running an affected release should either upgrade or use one of the workarounds immediately.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A ReDoS vulnerability in Action Dispatch allows a remote, unauthenticated attacker to cause a denial of service via specially crafted cookies and X_FORWARDED_HOST headers.

Vulnerability

CVE-2023-22792 is a regular expression denial-of-service (ReDoS) vulnerability in the Action Dispatch component of Ruby on Rails [1]. The flaw lies in the way Action Dispatch processes HTTP Cookie headers in combination with the X_FORWARDED_HOST header. When an attacker sends a specially crafted cookie value along with a malicious X_FORWARDED_HOST header, the regular expression engine enters a state of catastrophic backtracking [1]. This regex behavior causes the CPU and memory usage to spike, leading to a denial of service condition [1].

Attack

Vector and Prerequisites

The attack is exploitable remotely without authentication [1]. An attacker only needs to send a single HTTP request containing both a crafted cookie and a crafted X_FORWARDED_HOST header to a vulnerable Rails application [1]. No special network position is required; the attack can be delivered over the internet. The vulnerability is triggered during request processing, before any controller logic executes, meaning the application does not need to be in a specific state to be affected.

Impact

Successful exploitation results in high CPU and memory consumption on the target server, effectively causing a denial of service [1]. This can render the Rails application unresponsive to legitimate traffic, potentially affecting all users of the service. The impact is limited to availability; there is no evidence of data corruption or information disclosure from this vulnerability.

Mitigation

The vulnerability is fixed in Rails versions 6.0.6.1, 6.1.7.1, and 7.0.4.1 [3]. Users running any older version within the 6.0.x, 6.1.x, or 7.0.x series should upgrade immediately [3]. For those unable to upgrade, the official advisory recommends using a workaround, such as applying a monkey-patch or using a reverse proxy to sanitize the X_FORWARDED_HOST header [1][3].

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
actionpackRubyGems
>= 3.0.0, < 5.2.8.155.2.8.15
actionpackRubyGems
>= 6.0.0, < 6.1.7.16.1.7.1
actionpackRubyGems
>= 7.0.0, < 7.0.4.17.0.4.1

Affected products

10

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

9

News mentions

0

No linked articles in our index yet.