Resource Exhaustion Affecting ruby-addressable package, versions <2.8.0-r0


Severity

Recommended
0.0
high
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
0.5% (66th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Resource Exhaustion vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-ALPINE322-RUBYADDRESSABLE-10283779
  • published31 May 2025
  • disclosed6 Jul 2021

Introduced: 6 Jul 2021

CVE-2021-32740  (opens in a new tab)
CWE-400  (opens in a new tab)

How to fix?

Upgrade Alpine:3.22 ruby-addressable to version 2.8.0-r0 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream ruby-addressable package and not the ruby-addressable package as distributed by Alpine. See How to fix? for Alpine:3.22 relevant fixed versions and status.

Addressable is an alternative implementation to the URI implementation that is part of Ruby's standard library. An uncontrolled resource consumption vulnerability exists after version 2.3.0 through version 2.7.0. Within the URI template implementation in Addressable, a maliciously crafted template may result in uncontrolled resource consumption, leading to denial of service when matched against a URI. In typical usage, templates would not normally be read from untrusted user input, but nonetheless, no previous security advisory for Addressable has cautioned against doing this. Users of the parsing capabilities in Addressable but not the URI template capabilities are unaffected. The vulnerability is patched in version 2.8.0. As a workaround, only create Template objects from trusted sources that have been validated not to produce catastrophic backtracking.

CVSS Base Scores

version 3.1