Vulnerability Details : CVE-2022-23837
Potential exploit
In api.rb in Sidekiq before 5.2.10 and 6.4.0, there is no limit on the number of days when requesting stats for the graph. This overloads the system, affecting the Web UI, and makes it unavailable to users.
Products affected by CVE-2022-23837
- cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
- cpe:2.3:a:contribsys:sidekiq:*:*:*:*:*:*:*:*
- cpe:2.3:a:contribsys:sidekiq:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2022-23837
0.68%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 80 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2022-23837
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:N/A:P |
10.0
|
2.9
|
NIST | |
7.5
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
3.9
|
3.6
|
NIST |
CWE ids for CVE-2022-23837
-
The product allocates a reusable resource or group of resources on behalf of an actor without imposing any restrictions on the size or number of resources that can be allocated, in violation of the intended security policy for that actor.Assigned by: nvd@nist.gov (Primary)
References for CVE-2022-23837
-
https://github.com/rubysec/ruby-advisory-db/pull/495
Sidekiq version 5.2.10 also addresses CVE-2022-23837 by sqbell · Pull Request #495 · rubysec/ruby-advisory-db · GitHubPatch;Third Party Advisory
-
https://github.com/TUTUMSPACE/exploits/blob/main/sidekiq.md
exploits/sidekiq.md at main · TUTUMSPACE/exploits · GitHubExploit;Third Party Advisory
-
https://lists.debian.org/debian-lts-announce/2023/03/msg00011.html
[SECURITY] [DLA 3360-1] ruby-sidekiq security update
-
https://lists.debian.org/debian-lts-announce/2022/03/msg00015.html
[SECURITY] [DLA 2943-1] ruby-sidekiq security updateMailing List;Third Party Advisory
-
https://github.com/mperham/sidekiq/commit/7785ac1399f1b28992adb56055f6acd88fd1d956
Validate `days` parameter to avoid possible DoS in Web UI · mperham/sidekiq@7785ac1 · GitHubPatch;Third Party Advisory
Jump to