{"id":"BIT-ruby-min-2021-41817","details":"Date.parse in the date gem through 3.2.0 for Ruby allows ReDoS (regular expression Denial of Service) via a long string. The fixed versions are 3.2.1, 3.1.2, 3.0.2, and 2.0.1.","aliases":["BIT-ruby-2021-41817","CVE-2021-41817","GHSA-qg54-694p-wgpp"],"modified":"2025-04-03T14:40:37.652Z","published":"2025-01-27T07:20:29.820Z","database_specific":{"cpes":["cpe:2.3:a:ruby-lang:ruby:*:*:*:*:*:*:*:*"],"severity":"High"},"references":[{"type":"WEB","url":"https://hackerone.com/reports/1254844"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IUXQCH6FRKANCVZO2Q7D2SQX33FP3KWN/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UTOJGS5IEFDK3UOO7IY4OTTFGHGLSWZF/"},{"type":"WEB","url":"https://security.gentoo.org/glsa/202401-27"},{"type":"WEB","url":"https://www.ruby-lang.org/en/news/2021/11/15/date-parsing-method-regexp-dos-cve-2021-41817/"},{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-41817"}],"affected":[{"package":{"name":"ruby-min","ecosystem":"Bitnami","purl":"pkg:bitnami/ruby-min"},"ranges":[{"type":"SEMVER","events":[{"introduced":"2.6.0"},{"fixed":"2.6.9"},{"introduced":"2.7.0"},{"fixed":"2.7.5"},{"introduced":"3.0.0"},{"fixed":"3.0.3"}]}],"database_specific":{"source":"https://github.com/bitnami/vulndb/tree/main/data/ruby-min/BIT-ruby-min-2021-41817.json"},"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}],"schema_version":"1.7.3"}