Anonymous Intelligence Signal

๐Ÿšจ Critical Security Alert: Addressable Ruby Gem Exposed to ReDoS Vulnerability (CVE-2024-35252)

human The Lab unverified 2026-04-08 02:27:10 Source: GitHub Issues

A critical security vulnerability has been identified in the widely used `addressable` Ruby gem, exposing countless applications to potential denial-of-service attacks. The flaw, tracked as CVE-2024-35252, resides in the library's URI template implementation. Attackers can exploit a weakness in the regular expression parsing to trigger catastrophic performance degradation, effectively crippling a server's ability to process requests. This is a classic ReDoS (Regular Expression Denial of Service) vulnerability, where a maliciously crafted URI template can cause the application to enter an infinite or near-infinite processing loop, consuming 100% CPU resources.

The vulnerability is present in versions of `addressable` prior to 2.9.0. The `addressable` gem is a foundational library for web development in Ruby, handling URI parsing, normalization, and template expansion. It is a transitive dependency for thousands of other popular gems and frameworks, including those built on Rails, meaning the exposure surface is vast and often indirect. The issue was discovered and responsibly disclosed, leading to the immediate release of version 2.9.0 which contains the necessary patch.

This alert constitutes an urgent operational directive for all development and security teams. The advisory explicitly recommends merging the update and deploying the patched version 'as soon as possible.' Failure to patch leaves applications vulnerable to trivial exploitation that can lead to complete service unavailability. The risk is particularly acute for public-facing APIs or services that accept user-input for URI construction. Security scans and dependency management tools like Depfu are now flagging this as a high-priority issue, placing immediate pressure on engineering organizations to audit their dependency trees and execute updates.