Name | CVE-2023-26141 |
Description | Versions of the package sidekiq before 7.1.3 are vulnerable to Denial of Service (DoS) due to insufficient checks in the dashboard-charts.js file. An attacker can exploit this vulnerability by manipulating the localStorage value which will cause excessive polling requests. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Debian Bugs | 1059300 |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
ruby-sidekiq (PTS) | jessie | 3.2.6~dfsg-1 | vulnerable |
| stretch (security), stretch (lts), stretch | 4.2.3+dfsg-1+deb9u1 | vulnerable |
| buster (security), buster, buster (lts) | 5.2.3+dfsg-1+deb10u1 | vulnerable |
| bullseye | 6.0.4+dfsg-2 | vulnerable |
| bookworm | 6.4.1+dfsg-1 | vulnerable |
| sid, trixie | 7.3.2+dfsg-1 | fixed |
The information below is based on the following data on fixed versions.
Notes
[bookworm] - ruby-sidekiq <no-dsa> (Minor issue)
[bullseye] - ruby-sidekiq <no-dsa> (Minor issue)
[buster] - ruby-sidekiq <no-dsa> (Minor issue, DoS still possible)
https://security.snyk.io/vuln/SNYK-RUBY-SIDEKIQ-5885107
https://github.com/sidekiq/sidekiq/commit/62c90d7c5a7d8a378d79909859d87c2e0702bf89 (v7.1.3)