Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-28756: n/a

0
Unknown
VulnerabilityCVE-2023-28756cvecve-2023-28756
Published: Fri Mar 31 2023 (03/31/2023, 00:00:00 UTC)
Source: CVE Database V5

Description

A ReDoS issue was discovered in the Time component through 0.2.1 in Ruby through 3.2.1. The Time parser mishandles invalid URLs that have specific characters. It causes an increase in execution time for parsing strings to Time objects. The fixed versions are 0.1.1 and 0.2.2.

AI-Powered Analysis

AILast updated: 11/04/2025, 16:50:24 UTC

Technical Analysis

CVE-2023-28756 is a vulnerability classified as a Regular Expression Denial of Service (ReDoS) affecting the Time component in Ruby versions up to 3.2.1. The root cause lies in the Time parser's mishandling of invalid URLs containing specific characters when converting strings to Time objects. This mishandling causes the underlying regular expression engine to enter a state of excessive backtracking, significantly increasing execution time and CPU consumption. An attacker can exploit this by submitting specially crafted input strings that trigger this pathological regex behavior, leading to denial of service conditions due to resource exhaustion. The vulnerability does not require authentication or user interaction, making it potentially exploitable in any context where untrusted input is parsed as a time string. The fixed versions, starting from 0.2.2, address the issue by correcting the parsing logic to avoid the problematic regex evaluation. Although no known exploits have been reported in the wild, the vulnerability poses a risk to applications relying on vulnerable Ruby versions, especially web services exposed to external input. The absence of a CVSS score necessitates an independent severity assessment based on impact and exploitability factors.

Potential Impact

For European organizations, the primary impact of CVE-2023-28756 is the potential for denial of service attacks that can degrade or disrupt services relying on Ruby's Time component for parsing time strings. This can affect web applications, APIs, and backend services that process user-supplied or external data containing time information. The increased CPU usage caused by the ReDoS can lead to service slowdowns, increased operational costs, and potential downtime, impacting business continuity and user experience. Organizations in sectors such as finance, e-commerce, and public services that depend on Ruby-based applications are particularly vulnerable. Additionally, the vulnerability could be leveraged as part of a larger attack chain to distract or exhaust resources during more sophisticated intrusions. While the vulnerability does not directly compromise confidentiality or integrity, the availability impact can have significant operational consequences.

Mitigation Recommendations

To mitigate CVE-2023-28756, organizations should immediately upgrade Ruby to version 0.2.2 or later where the vulnerability is fixed. Where upgrading is not immediately feasible, implement input validation and sanitization to reject or safely handle malformed or suspicious time strings before parsing. Employ application-layer rate limiting and input size restrictions to reduce the risk of resource exhaustion from repeated malicious requests. Monitor application performance metrics and logs for unusual spikes in CPU usage or parsing errors that may indicate exploitation attempts. Incorporate fuzz testing and static analysis tools in the development lifecycle to detect similar regex-related vulnerabilities. Finally, ensure that incident response plans include procedures for handling denial of service incidents related to input parsing.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2023-03-23T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 690a2dddf0ba78a050535ad0

Added to database: 11/4/2025, 4:46:21 PM

Last enriched: 11/4/2025, 4:50:24 PM

Last updated: 11/6/2025, 12:45:31 PM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats