-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2023.1903
                CVE-2023-28755: ReDoS vulnerability in URI
                               31 March 2023

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Ruby
Publisher:         Ruby
Operating System:  UNIX variants (UNIX, Linux, OSX)
                   Windows
Resolution:        Patch/Upgrade
CVE Names:         CVE-2023-28755  

Original Bulletin: 
   https://www.ruby-lang.org/en/news/2023/03/28/redos-in-uri-cve-2023-28755/

Comment: CVSS (Max):  7.5 CVE-2023-28755 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
         CVSS Source: SUSE
         Calculator:  https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

- --------------------------BEGIN INCLUDED TEXT--------------------

CVE-2023-28755: ReDoS vulnerability in URI

Posted by hsbt on 28 Mar 2023

We have released the uri gem version 0.12.1, 0.11.1, 0.10.2 and 0.10.0.1 that
has a security fix for a ReDoS vulnerability. This vulnerability has been
assigned the CVE identifier CVE-2023-28755.

Details

A ReDoS issue was discovered in the URI component. The URI parser mishandles
invalid URLs that have specific characters. It causes an increase in execution
time for parsing strings to URI objects.

The uri gem version 0.12.0, 0.11.0, 0.10.1, 0.10.0 and all versions prior
0.10.0 are vulnerable for this vulnerability.

Recommended action

We recommend to update the uri gem to 0.12.1. In order to ensure compatibility
with bundled version in older Ruby series, you may update as follows instead:

  o For Ruby 2.7: Update to uri 0.10.0.1
  o For Ruby 3.0: Update to uri 0.10.2
  o For Ruby 3.1: Update to uri 0.11.1
  o For Ruby 3.2: Update to uri 0.12.1

You can use gem update uri to update it. If you are using bundler, please add
gem "uri", ">= 0.12.1" (or other version mentioned above) to your Gemfile.

Affected versions

  o uri gem 0.12.0
  o uri gem 0.11.0
  o uri gem 0.10.1
  o uri gem 0.10.0 or before

Credits

Thanks to Dominic Couture for discovering this issue.

History

  o Originally published at 2023-03-28 01:00:00 (UTC)
  o Update Affected versions at 2023-03-28 02:00:00 (UTC)

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: https://auscert.org.au/gpg-key/
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=Snj/
-----END PGP SIGNATURE-----