Advisory Database
  • Advisories
  • Dependency Scanning
  1. gem
  2. ›
  3. user_agent_parser
  4. ›
  5. GMS-2020-701

GMS-2020-701: Denial of Service in uap-core when processing crafted User-Agent strings

March 10, 2020

Impact

Some regexes are vulnerable to regular expression denial of service (REDoS) due to overlapping capture groups. This allows remote attackers to overload a server by setting the User-Agent header in an HTTP(S) request to maliciously crafted long strings.

Patches

Please update uap-ruby to >= v2.6.0

For more information

https://github.com/ua-parser/uap-core/security/advisories/GHSA-cmcx-xhr8-3w9p

Reported in uap-core by Ben Caller @bcaller

References

  • github.com/advisories/GHSA-pcqq-5962-hvcw
  • github.com/ua-parser/uap-ruby/commit/2bb18268f4c5ba7d4ba0e21c296bf6437063da3a
  • github.com/ua-parser/uap-ruby/security/advisories/GHSA-pcqq-5962-hvcw

Code Behaviors & Features

Detect and mitigate GMS-2020-701 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 2.6.0

Fixed versions

  • 2.6.0

Solution

Upgrade to version 2.6.0 or above.

Source file

gem/user_agent_parser/GMS-2020-701.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:15:23 +0000.