CVE-2023-36617: n/a
A ReDoS issue was discovered in the URI component before 0.12.2 for Ruby. The URI parser mishandles invalid URLs that have specific characters. There is an increase in execution time for parsing strings to URI objects with rfc2396_parser.rb and rfc3986_parser.rb. NOTE: this issue exists becuse of an incomplete fix for CVE-2023-28755. Version 0.10.3 is also a fixed version.
AI Analysis
Technical Summary
CVE-2023-36617 is a ReDoS vulnerability found in the URI component of Ruby before version 0.12.2. The vulnerability stems from the URI parser's handling of invalid URLs containing certain characters, which causes the regular expression engine to consume excessive CPU resources, significantly increasing execution time during parsing. This flaw exists due to an incomplete remediation of a previous vulnerability, CVE-2023-28755. The affected files include rfc2396_parser.rb and rfc3986_parser.rb, which implement URI parsing according to RFC 2396 and RFC 3986 standards. When maliciously crafted URLs are processed, the parser’s regex patterns enter pathological backtracking states, resulting in denial of service through resource exhaustion. Although no public exploits have been observed, the vulnerability poses a risk to any Ruby-based application or service that parses user-supplied URLs without proper input validation or patching. The issue affects all versions prior to 0.12.2, with 0.10.3 also noted as a fixed version. This vulnerability is particularly relevant for web applications, APIs, and services that rely on Ruby’s URI parsing for URL validation, routing, or processing.
Potential Impact
For European organizations, the primary impact of CVE-2023-36617 is the potential for denial of service attacks against Ruby-based applications and services that parse URLs. This can lead to service outages, degraded performance, and increased operational costs due to resource exhaustion. Industries relying heavily on Ruby, such as fintech, e-commerce, and web hosting providers, may experience disruptions affecting customer-facing services. Additionally, denial of service conditions can be exploited as part of multi-vector attacks, increasing the risk of broader operational impacts. While the vulnerability does not directly compromise confidentiality or integrity, the availability impact can affect business continuity and reputation. Organizations with automated URL processing or those exposing APIs that accept URLs as input are particularly at risk. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially as proof-of-concept exploits could emerge.
Mitigation Recommendations
European organizations should immediately identify and inventory Ruby environments using the vulnerable URI component versions. Upgrading to Ruby URI component version 0.12.2 or 0.10.3 (whichever is applicable) is the most effective mitigation. Where immediate patching is not feasible, implement input validation and sanitization to reject malformed or suspicious URLs before parsing. Employ rate limiting and resource usage monitoring on services that parse URLs to detect and mitigate potential ReDoS attempts. Application-layer firewalls or web application firewalls (WAFs) can be configured to block or throttle requests containing suspicious URL patterns. Additionally, conduct code reviews and static analysis to identify other potential ReDoS vulnerabilities in regex usage. Maintain up-to-date threat intelligence to respond quickly if exploits emerge. Finally, incorporate this vulnerability into incident response plans to ensure rapid containment if exploitation occurs.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain
CVE-2023-36617: n/a
Description
A ReDoS issue was discovered in the URI component before 0.12.2 for Ruby. The URI parser mishandles invalid URLs that have specific characters. There is an increase in execution time for parsing strings to URI objects with rfc2396_parser.rb and rfc3986_parser.rb. NOTE: this issue exists becuse of an incomplete fix for CVE-2023-28755. Version 0.10.3 is also a fixed version.
AI-Powered Analysis
Technical Analysis
CVE-2023-36617 is a ReDoS vulnerability found in the URI component of Ruby before version 0.12.2. The vulnerability stems from the URI parser's handling of invalid URLs containing certain characters, which causes the regular expression engine to consume excessive CPU resources, significantly increasing execution time during parsing. This flaw exists due to an incomplete remediation of a previous vulnerability, CVE-2023-28755. The affected files include rfc2396_parser.rb and rfc3986_parser.rb, which implement URI parsing according to RFC 2396 and RFC 3986 standards. When maliciously crafted URLs are processed, the parser’s regex patterns enter pathological backtracking states, resulting in denial of service through resource exhaustion. Although no public exploits have been observed, the vulnerability poses a risk to any Ruby-based application or service that parses user-supplied URLs without proper input validation or patching. The issue affects all versions prior to 0.12.2, with 0.10.3 also noted as a fixed version. This vulnerability is particularly relevant for web applications, APIs, and services that rely on Ruby’s URI parsing for URL validation, routing, or processing.
Potential Impact
For European organizations, the primary impact of CVE-2023-36617 is the potential for denial of service attacks against Ruby-based applications and services that parse URLs. This can lead to service outages, degraded performance, and increased operational costs due to resource exhaustion. Industries relying heavily on Ruby, such as fintech, e-commerce, and web hosting providers, may experience disruptions affecting customer-facing services. Additionally, denial of service conditions can be exploited as part of multi-vector attacks, increasing the risk of broader operational impacts. While the vulnerability does not directly compromise confidentiality or integrity, the availability impact can affect business continuity and reputation. Organizations with automated URL processing or those exposing APIs that accept URLs as input are particularly at risk. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially as proof-of-concept exploits could emerge.
Mitigation Recommendations
European organizations should immediately identify and inventory Ruby environments using the vulnerable URI component versions. Upgrading to Ruby URI component version 0.12.2 or 0.10.3 (whichever is applicable) is the most effective mitigation. Where immediate patching is not feasible, implement input validation and sanitization to reject malformed or suspicious URLs before parsing. Employ rate limiting and resource usage monitoring on services that parse URLs to detect and mitigate potential ReDoS attempts. Application-layer firewalls or web application firewalls (WAFs) can be configured to block or throttle requests containing suspicious URL patterns. Additionally, conduct code reviews and static analysis to identify other potential ReDoS vulnerabilities in regex usage. Maintain up-to-date threat intelligence to respond quickly if exploits emerge. Finally, incorporate this vulnerability into incident response plans to ensure rapid containment if exploitation occurs.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2023-06-25T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 690a2dddf0ba78a050535ae9
Added to database: 11/4/2025, 4:46:21 PM
Last enriched: 11/4/2025, 4:51:09 PM
Last updated: 11/6/2025, 12:17:30 PM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-11268: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in wpchill Strong Testimonials
MediumCVE-2025-12360: CWE-285 Improper Authorization in codesolz Better Find and Replace – AI-Powered Suggestions
MediumCVE-2025-10259: CWE-1284 Improper Validation of Specified Quantity in Input in Mitsubishi Electric Corporation MELSEC iQ-F Series FX5U-32MT/ES
MediumCVE-2025-12471: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in nerdpressteam Hubbub Lite – Fast, free social sharing and follow buttons
MediumCVE-2025-9338: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer in ASUS Armoury Crate
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.