{"id":"CVE-2023-28756","details":"A ReDoS issue was discovered in the Time component through 0.2.1 in Ruby through 3.2.1. The Time parser mishandles invalid URLs that have specific characters. It causes an increase in execution time for parsing strings to Time objects. The fixed versions are 0.1.1 and 0.2.2.","aliases":["BIT-ruby-2023-28756","BIT-ruby-min-2023-28756","GHSA-fg7x-g82r-94qc"],"modified":"2026-04-11T12:45:07.960322Z","published":"2023-03-31T04:15:09.090Z","related":["ALSA-2023:3821","ALSA-2023:7025","ALSA-2024:1431","ALSA-2024:1576","ALSA-2024:3500","ALSA-2024:3838","CGA-jx78-xh3q-cr8c","SUSE-SU-2023:4176-1"],"database_specific":{"unresolved_ranges":[{"cpe":"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","source":"CPE_FIELD","extracted_events":[{"last_affected":"10.0"}]},{"cpe":"cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*","source":"CPE_FIELD","extracted_events":[{"last_affected":"36"}]},{"cpe":"cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*","source":"CPE_FIELD","extracted_events":[{"last_affected":"37"}]},{"cpe":"cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*","source":"CPE_FIELD","extracted_events":[{"last_affected":"38"}]}]},"references":[{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2024/09/msg00000.html"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FFZANOQA4RYX7XCB42OO3P24DQKWHEKA/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/G76GZG3RAGYF4P75YY7J7TGYAU7Z5E2T/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WMIOPLBAAM3FEQNAXA2L7BDKOGSVUT5Z/"},{"type":"ADVISORY","url":"https://github.com/ruby/time/releases/"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2023/04/msg00033.html"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/202401-27"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20230526-0004/"},{"type":"ADVISORY","url":"https://www.ruby-lang.org/en/downloads/releases/"},{"type":"ADVISORY","url":"https://www.ruby-lang.org/en/news/2022/12/25/ruby-3-2-0-released/"},{"type":"ADVISORY","url":"https://www.ruby-lang.org/en/news/2023/03/30/redos-in-time-cve-2023-28756/"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/ruby/ruby","events":[{"introduced":"0"},{"last_affected":"168ec2b1e5ad0e4688e963d9de019557c78feed9"}],"database_specific":{"cpe":"cpe:2.3:a:ruby-lang:ruby:*:*:*:*:*:*:*:*","source":"CPE_FIELD","extracted_events":[{"introduced":"0"},{"last_affected":"2.7.7"}]}}],"versions":["v1_0_r2","v2_7_0","v2_7_0_preview1","v2_7_0_preview2","v2_7_0_preview3","v2_7_0_rc1","v2_7_0_rc2","v2_7_1","v2_7_2","v2_7_3","v2_7_4","v2_7_5","v2_7_6","v2_7_7"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-28756.json"}},{"ranges":[{"type":"GIT","repo":"https://github.com/ruby/time","events":[{"introduced":"0"},{"last_affected":"652243ec44f7a0d04a3d4f57d241c670cf9f002e"},{"last_affected":"4cebf6de3c25321ca604d991e7a0c684268c656a"}],"database_specific":{"cpe":["cpe:2.3:a:ruby-lang:time:0.1.0:*:*:*:*:ruby:*:*","cpe:2.3:a:ruby-lang:time:0.2.1:*:*:*:*:ruby:*:*"],"source":"CPE_FIELD","extracted_events":[{"introduced":"0"},{"last_affected":"0.1.0"},{"last_affected":"0.2.1"}]}}],"versions":["v0.1.0","v0.2.0","v0.2.1"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-28756.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}]}