Overview
CVE-2024-0241 is a severe vulnerability that affects versions of encoded_id-rails that are before 1.0.0.beta2. This flaw allows a remote and unauthenticated attacker to potentially cause a Denial of Service (DoS) state. The impact of this vulnerability is significant, as it could cause severe disruptions in services and potentially lead to system compromise or data leakage.
Vulnerability Summary
CVE ID: CVE-2024-0241
Severity: High (CVSS: 7.5)
Attack Vector: Network
Privileges Required: None
User Interaction: None
Impact: The successful exploitation of this vulnerability can lead to a Denial of Service (DoS) condition, potentially causing system compromise or data leakage.
Affected Products
Escape the Surveillance Era
Most apps won’t tell you the truth.
They’re part of the problem.
Phone numbers. Emails. Profiles. Logs.
It’s all fuel for surveillance.
Ameeba Chat gives you a way out.
- • No phone number
- • No email
- • No personal info
- • Anonymous aliases
- • End-to-end encrypted
Chat without a trace.
Product | Affected Versions
Encoded_id-rails | Before 1.0.0.beta2
How the Exploit Works
The vulnerability lies in the handling of the “id” parameter in an HTTP request by encoded_id-rails. By sending an HTTP request with an extremely long “id” parameter, a remote and unauthenticated attacker can trigger a buffer overflow condition. This, in turn, can lead to uncontrolled resource consumption, causing a denial of service condition.
Conceptual Example Code
Below is a conceptual example of how the vulnerability might be exploited. This example shows a HTTP POST request with an extremely long “id” parameter:
POST /rails/encoded_id HTTP/1.1
Host: target.example.com
Content-Type: application/x-www-form-urlencoded
id=111111111111111111111111111111111111111111111111111111111111111111111111111111111111111....
Please note that it is a conceptual example and the actual exploit code might differ.

