Overview
CVE-2024-0241 is a severe vulnerability that affects versions of encoded_id-rails that are before 1.0.0.beta2. This flaw allows a remote and unauthenticated attacker to potentially cause a Denial of Service (DoS) state. The impact of this vulnerability is significant, as it could cause severe disruptions in services and potentially lead to system compromise or data leakage.
Vulnerability Summary
CVE ID: CVE-2024-0241
Severity: High (CVSS: 7.5)
Attack Vector: Network
Privileges Required: None
User Interaction: None
Impact: The successful exploitation of this vulnerability can lead to a Denial of Service (DoS) condition, potentially causing system compromise or data leakage.
Affected Products
A new way to communicate
Ameeba Chat is built on encrypted identity, not personal profiles.
Message, call, share files, and coordinate with identities kept separate.
- • Encrypted identity
- • Ameeba Chat authenticates access
- • Aliases and categories
- • End-to-end encrypted chat, calls, and files
- • Secure notes for sensitive information
Private communication, rethought.
Product | Affected Versions
Encoded_id-rails | Before 1.0.0.beta2
How the Exploit Works
The vulnerability lies in the handling of the “id” parameter in an HTTP request by encoded_id-rails. By sending an HTTP request with an extremely long “id” parameter, a remote and unauthenticated attacker can trigger a buffer overflow condition. This, in turn, can lead to uncontrolled resource consumption, causing a denial of service condition.
Conceptual Example Code
Below is a conceptual example of how the vulnerability might be exploited. This example shows a HTTP POST request with an extremely long “id” parameter:
POST /rails/encoded_id HTTP/1.1
Host: target.example.com
Content-Type: application/x-www-form-urlencoded
id=111111111111111111111111111111111111111111111111111111111111111111111111111111111111111....
Please note that it is a conceptual example and the actual exploit code might differ.
