Advisory Database
  • Advisories
  • Dependency Scanning
  1. gem
  2. ›
  3. uri
  4. ›
  5. CVE-2023-36617

CVE-2023-36617: URI gem has ReDoS vulnerability

June 29, 2023 (updated November 4, 2025)

A ReDoS issue was discovered in the URI component before 0.12.2 for Ruby. The URI parser mishandles invalid URLs that have specific characters. There is an increase in execution time for parsing strings to URI objects with rfc2396_parser.rb and rfc3986_parser.rb.

NOTE: this issue exists becuse of an incomplete fix for CVE-2023-28755. Version 0.10.3 is also a fixed version.

The Ruby advisory recommends updating the uri gem to 0.12.2. In order to ensure compatibility with the bundled version in older Ruby series, you may update as follows instead:

  • For Ruby 3.0: Update to uri 0.10.3
  • For Ruby 3.1 and 3.2: Update to uri 0.12.2.

You can use gem update uri to update it. If you are using bundler, please add gem uri, >= 0.12.2 (or other version mentioned above) to your Gemfile.

References

  • github.com/advisories/GHSA-hww2-5g85-429m
  • github.com/ruby/uri
  • github.com/ruby/uri/commit/05b1e7d026b886e65a60ee35625229da9ec220bb
  • github.com/ruby/uri/commit/38bf797c488bcb4a37fb322bfa84977981863ec6
  • github.com/ruby/uri/commit/3cd938df20db26c9439e9f681aadfb9bbeb6d1c0
  • github.com/ruby/uri/commit/4d02315181d8a485496f1bb107a6ab51d6f3a35f
  • github.com/ruby/uri/commit/70794abc162bb15bb934713b5669713d6700d35c
  • github.com/ruby/uri/commit/7e33934c91b7f8f3ea7b7a4258b468e19f636bc3
  • github.com/ruby/uri/commit/9a8e0cc03da964054c2a4ea26b59c53c3bae4921
  • github.com/ruby/uri/commit/ba36c8a3ecad8c16dd3e60a6da9abd768206c8fa
  • github.com/rubysec/ruby-advisory-db/blob/master/gems/uri/CVE-2023-36617.yml
  • lists.debian.org/debian-lts-announce/2024/09/msg00000.html
  • lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/27LUWREIFTP3MQAW7QE4PJM4DPAQJWXF
  • lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QA6XUKUY7B5OLNQBLHOT43UW7C5NIOQQ
  • lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/27LUWREIFTP3MQAW7QE4PJM4DPAQJWXF
  • nvd.nist.gov/vuln/detail/CVE-2023-36617
  • security.netapp.com/advisory/ntap-20230725-0002
  • www.ruby-lang.org/en/news/2023/06/29/redos-in-uri-CVE-2023-36617

Code Behaviors & Features

Detect and mitigate CVE-2023-36617 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 0.10.0.3, all versions starting from 0.10.1 before 0.10.3, all versions starting from 0.11.0 before 0.11.2, all versions starting from 0.12.0 before 0.12.2

Fixed versions

  • 0.10.3
  • 0.12.2
  • 0.11.2
  • 0.10.0.3

Solution

Upgrade to versions 0.10.0.3, 0.10.3, 0.11.2, 0.12.2 or above.

Impact 5.3 MEDIUM

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

Learn more about CVSS

Weakness

  • CWE-1333: Inefficient Regular Expression Complexity

Source file

gem/uri/CVE-2023-36617.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Sun, 14 Dec 2025 00:20:38 +0000.