VYPR
High severity7.5NVD Advisory· Published Jan 4, 2024· Updated May 14, 2026

CVE-2024-0241

CVE-2024-0241

Description

encoded_id-rails versions before 1.0.0.beta2 are affected by an uncontrolled resource consumption vulnerability. A remote and unauthenticated attacker might cause a denial of service condition by sending an HTTP request with an extremely long "id" parameter.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
encoded_id-railsRubyGems
< 1.0.0.beta21.0.0.beta2

Affected products

1
  • /v5
    Range: 0

Patches

1
afa495a77b8a

Update encoded_id dependency to address GHSA-3px7-jm2p-6h2c

https://github.com/stevegeek/encoded_id-railsStephen IerodiaconouOct 23, 2023via ghsa
1 file changed · +1 1
  • encoded_id-rails.gemspec+1 1 modified
    @@ -32,7 +32,7 @@ Gem::Specification.new do |spec|
       # Uncomment to register a new dependency of your gem
       spec.add_dependency "activesupport", ">= 6.0", "< 8.0"
       spec.add_dependency "activerecord", ">= 6.0", "< 8.0"
    -  spec.add_dependency "encoded_id", "~> 1.0.0.rc2"
    +  spec.add_dependency "encoded_id", "~> 1.0.0.rc3"
     
       # For more information and examples about making a new gem, check out our
       # guide at: https://bundler.io/guides/creating_gem.html
    

Vulnerability mechanics

Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

6

News mentions

0

No linked articles in our index yet.