{
  "threat_severity" : "Moderate",
  "public_date" : "2025-03-03T00:00:00Z",
  "bugzilla" : {
    "description" : "CGI: Denial of Service in CGI::Cookie.parse",
    "id" : "2349699",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2349699"
  },
  "cvss3" : {
    "cvss3_base_score" : "5.3",
    "cvss3_scoring_vector" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
    "status" : "verified"
  },
  "cwe" : "CWE-770",
  "details" : [ "In the CGI gem before 0.4.2 for Ruby, the CGI::Cookie.parse method in the CGI library contains a potential Denial of Service (DoS) vulnerability. The method does not impose any limit on the length of the raw cookie value it processes. This oversight can lead to excessive resource consumption when parsing extremely large cookies.", "A flaw was found in Ruby's CGI gem. Processing specially crafted large cookies with the CGI::Cookie.parse method can cause excessive resource consumption due to a missing limit on the length of the raw cookie value, resulting in a denial of service." ],
  "statement" : "This issue will cause an excessive resource consumption, potentially resulting in a bad application performance. However, an attacker does have the ability to completely deny service to legitimate users. For this reason, this vulnerability has been rated with a moderate severity.",
  "affected_release" : [ {
    "product_name" : "Red Hat Enterprise Linux 10",
    "release_date" : "2025-05-26T00:00:00Z",
    "advisory" : "RHSA-2025:8131",
    "cpe" : "cpe:/o:redhat:enterprise_linux:10.0",
    "package" : "ruby-0:3.3.8-10.el10_0"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8",
    "release_date" : "2025-07-02T00:00:00Z",
    "advisory" : "RHSA-2025:10217",
    "cpe" : "cpe:/a:redhat:enterprise_linux:8",
    "package" : "ruby:3.3-8100020250414172630.489197e6"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8",
    "release_date" : "2025-04-23T00:00:00Z",
    "advisory" : "RHSA-2025:4063",
    "cpe" : "cpe:/a:redhat:enterprise_linux:8",
    "package" : "ruby:3.1-8100020250407112943.489197e6"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9",
    "release_date" : "2025-05-06T00:00:00Z",
    "advisory" : "RHSA-2025:4487",
    "cpe" : "cpe:/a:redhat:enterprise_linux:9",
    "package" : "ruby-0:3.0.7-165.el9_5"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9",
    "release_date" : "2025-05-06T00:00:00Z",
    "advisory" : "RHSA-2025:4488",
    "cpe" : "cpe:/a:redhat:enterprise_linux:9",
    "package" : "ruby:3.1-9050020250404144903.9"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9",
    "release_date" : "2025-05-06T00:00:00Z",
    "advisory" : "RHSA-2025:4493",
    "cpe" : "cpe:/a:redhat:enterprise_linux:9",
    "package" : "ruby:3.3-9050020250415095239.9"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat Enterprise Linux 6",
    "fix_state" : "Out of support scope",
    "package_name" : "ruby",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "fix_state" : "Out of support scope",
    "package_name" : "ruby",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8",
    "fix_state" : "Out of support scope",
    "package_name" : "ruby:2.5/ruby",
    "cpe" : "cpe:/o:redhat:enterprise_linux:8"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2025-27219\nhttps://nvd.nist.gov/vuln/detail/CVE-2025-27219\nhttps://www.ruby-lang.org/en/news/2025/02/26/security-advisories/" ],
  "name" : "CVE-2025-27219",
  "mitigation" : {
    "value" : "Do not process large cookies or strings with the CGI::Cookie.parse method from the CGI library. Adding a check to verify and limit the length of the cookie or string before processing it will mitigate this vulnerability.",
    "lang" : "en:us"
  },
  "csaw" : false
}