{"vulnerability": "CVE-2023-22795", "sightings": [{"uuid": "51c45665-1a0c-4bab-8139-50c5429a6399", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-22795", "type": "seen", "source": "https://t.me/cibsecurity/57872", "content": "\u203c CVE-2023-22795 \u203c\n\nA regular expression based DoS vulnerability in Action Dispatch &lt;6.1.7.1 and &lt;7.0.4.1 related to the If-None-Match header. A specially crafted HTTP If-None-Match header can cause the regular expression engine to enter a state of catastrophic backtracking, when on a version of Ruby below 3.2.0. This can cause the process to use large amounts of CPU and memory, leading to a possible DoS vulnerability All users running an affected release should either upgrade or use one of the workarounds immediately.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-02-09T22:26:26.000000Z"}, {"uuid": "aed834f7-3698-4b62-857f-c00e659b8b78", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-22795", "type": "seen", "source": "https://t.me/ctinow/178108", "content": "https://ift.tt/QAzZ65B\nCVE-2023-22795 Ruby on Rails Vulnerability in NetApp Products", "creation_timestamp": "2024-02-02T15:27:12.000000Z"}]}