All the vulnerabilites related to rack - rack
cve-2024-26146
Vulnerability from cvelistv5
Published
2024-02-28 23:28
Modified
2024-08-01 23:59
Severity ?
EPSS score ?
Summary
Possible Denial of Service Vulnerability in Rack Header Parsing
References
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:rack_project:rack:2.2.0:*:*:*:*:ruby:*:*", "cpe:2.3:a:rack_project:rack:2.1.0:*:*:*:*:ruby:*:*", "cpe:2.3:a:rack_project:rack:3.0.0:-:*:*:*:ruby:*:*" ], "defaultStatus": "unknown", "product": "rack", "vendor": "rack_project", "versions": [ { "lessThan": "2.1.4.4", "status": "affected", "version": "2.1.0", "versionType": "custom" }, { "lessThan": "2.2.8.1", "status": "affected", "version": "2.2.0", "versionType": "custom" }, { "lessThan": "3.0.9.1", "status": "affected", "version": "3.0.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:rack_project:rack:*:*:*:*:*:ruby:*:*" ], "defaultStatus": "unknown", "product": "rack", "vendor": "rack_project", "versions": [ { "lessThan": "2.0.9.4", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-26146", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-02-29T17:31:54.207314Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-25T16:39:52.274Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T23:59:32.576Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/rack/rack/security/advisories/GHSA-54rr-7fvw-6x8f", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/rack/rack/security/advisories/GHSA-54rr-7fvw-6x8f" }, { "name": "https://github.com/rack/rack/commit/30b8e39a578b25d4bdcc082c1c52c6f164b59716", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/rack/rack/commit/30b8e39a578b25d4bdcc082c1c52c6f164b59716" }, { "name": "https://github.com/rack/rack/commit/6c5d90bdcec0949f7ba06db62fb740dab394b582", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/rack/rack/commit/6c5d90bdcec0949f7ba06db62fb740dab394b582" }, { "name": "https://github.com/rack/rack/commit/a227cd793778c7c3a827d32808058571569cda6f", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/rack/rack/commit/a227cd793778c7c3a827d32808058571569cda6f" }, { "name": "https://github.com/rack/rack/commit/e4c117749ba24a66f8ec5a08eddf68deeb425ccd", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/rack/rack/commit/e4c117749ba24a66f8ec5a08eddf68deeb425ccd" }, { "name": "https://discuss.rubyonrails.org/t/possible-denial-of-service-vulnerability-in-rack-header-parsing/84942", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://discuss.rubyonrails.org/t/possible-denial-of-service-vulnerability-in-rack-header-parsing/84942" }, { "name": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2024-26146.yml", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2024-26146.yml" }, { "tags": [ "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00022.html" }, { "tags": [ "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20240510-0006/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "rack", "vendor": "rack", "versions": [ { "status": "affected", "version": "\u003e= 3.0.0, \u003c 3.0.9.1" }, { "status": "affected", "version": "\u003e= 2.2.0, \u003c 2.2.8.1" }, { "status": "affected", "version": "\u003e= 2.1.0, \u003c 2.1.4.4" }, { "status": "affected", "version": "\u003c 2.0.9.4" } ] } ], "descriptions": [ { "lang": "en", "value": "Rack is a modular Ruby web server interface. Carefully crafted headers can cause header parsing in Rack to take longer than expected resulting in a possible denial of service issue. Accept and Forwarded headers are impacted. Ruby 3.2 has mitigations for this problem, so Rack applications using Ruby 3.2 or newer are unaffected. This vulnerability is fixed in 2.0.9.4, 2.1.4.4, 2.2.8.1, and 3.0.9.1.\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-1333", "description": "CWE-1333: Inefficient Regular Expression Complexity", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-02-28T23:28:01.158Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/rack/rack/security/advisories/GHSA-54rr-7fvw-6x8f", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/rack/rack/security/advisories/GHSA-54rr-7fvw-6x8f" }, { "name": "https://github.com/rack/rack/commit/30b8e39a578b25d4bdcc082c1c52c6f164b59716", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/rack/rack/commit/30b8e39a578b25d4bdcc082c1c52c6f164b59716" }, { "name": "https://github.com/rack/rack/commit/6c5d90bdcec0949f7ba06db62fb740dab394b582", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/rack/rack/commit/6c5d90bdcec0949f7ba06db62fb740dab394b582" }, { "name": "https://github.com/rack/rack/commit/a227cd793778c7c3a827d32808058571569cda6f", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/rack/rack/commit/a227cd793778c7c3a827d32808058571569cda6f" }, { "name": "https://github.com/rack/rack/commit/e4c117749ba24a66f8ec5a08eddf68deeb425ccd", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/rack/rack/commit/e4c117749ba24a66f8ec5a08eddf68deeb425ccd" }, { "name": "https://discuss.rubyonrails.org/t/possible-denial-of-service-vulnerability-in-rack-header-parsing/84942", "tags": [ "x_refsource_MISC" ], "url": "https://discuss.rubyonrails.org/t/possible-denial-of-service-vulnerability-in-rack-header-parsing/84942" }, { "name": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2024-26146.yml", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2024-26146.yml" }, { "url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00022.html" }, { "url": "https://security.netapp.com/advisory/ntap-20240510-0006/" } ], "source": { "advisory": "GHSA-54rr-7fvw-6x8f", "discovery": "UNKNOWN" }, "title": "Possible Denial of Service Vulnerability in Rack Header Parsing" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-26146", "datePublished": "2024-02-28T23:28:01.158Z", "dateReserved": "2024-02-14T17:40:03.689Z", "dateUpdated": "2024-08-01T23:59:32.576Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-16471
Vulnerability from cvelistv5
Published
2018-11-13 23:00
Modified
2024-08-05 10:24
Severity ?
EPSS score ?
Summary
There is a possible XSS vulnerability in Rack before 2.0.6 and 1.6.11. Carefully crafted requests can impact the data returned by the `scheme` method on `Rack::Request`. Applications that expect the scheme to be limited to 'http' or 'https' and do not escape the return value could be vulnerable to an XSS attack. Note that applications using the normal escaping mechanisms provided by Rails may not impacted, but applications that bypass the escaping mechanisms, or do not use them may be vulnerable.
References
▼ | URL | Tags |
---|---|---|
https://groups.google.com/forum/#%21topic/rubyonrails-security/GKsAFT924Ag | x_refsource_MISC | |
https://lists.debian.org/debian-lts-announce/2018/11/msg00022.html | mailing-list, x_refsource_MLIST | |
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00032.html | vendor-advisory, x_refsource_SUSE | |
https://usn.ubuntu.com/4089-1/ | vendor-advisory, x_refsource_UBUNTU | |
http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00016.html | vendor-advisory, x_refsource_SUSE |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T10:24:32.587Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://groups.google.com/forum/#%21topic/rubyonrails-security/GKsAFT924Ag" }, { "name": "[debian-lts-announce] 20181121 [SECURITY] [DLA 1585-1] ruby-rack security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2018/11/msg00022.html" }, { "name": "openSUSE-SU-2019:1553", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00032.html" }, { "name": "USN-4089-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/4089-1/" }, { "name": "openSUSE-SU-2020:0214", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00016.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Rack", "vendor": "Rack", "versions": [ { "status": "affected", "version": "2.0.6, 1.6.11" } ] } ], "datePublic": "2018-11-05T00:00:00", "descriptions": [ { "lang": "en", "value": "There is a possible XSS vulnerability in Rack before 2.0.6 and 1.6.11. Carefully crafted requests can impact the data returned by the `scheme` method on `Rack::Request`. Applications that expect the scheme to be limited to \u0027http\u0027 or \u0027https\u0027 and do not escape the return value could be vulnerable to an XSS attack. Note that applications using the normal escaping mechanisms provided by Rails may not impacted, but applications that bypass the escaping mechanisms, or do not use them may be vulnerable." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "Cross-site Scripting (XSS) - Stored (CWE-79)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-02-12T21:06:06", "orgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "shortName": "hackerone" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://groups.google.com/forum/#%21topic/rubyonrails-security/GKsAFT924Ag" }, { "name": "[debian-lts-announce] 20181121 [SECURITY] [DLA 1585-1] ruby-rack security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2018/11/msg00022.html" }, { "name": "openSUSE-SU-2019:1553", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00032.html" }, { "name": "USN-4089-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/4089-1/" }, { "name": "openSUSE-SU-2020:0214", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00016.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "support@hackerone.com", "ID": "CVE-2018-16471", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Rack", "version": { "version_data": [ { "version_value": "2.0.6, 1.6.11" } ] } } ] }, "vendor_name": "Rack" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a possible XSS vulnerability in Rack before 2.0.6 and 1.6.11. Carefully crafted requests can impact the data returned by the `scheme` method on `Rack::Request`. Applications that expect the scheme to be limited to \u0027http\u0027 or \u0027https\u0027 and do not escape the return value could be vulnerable to an XSS attack. Note that applications using the normal escaping mechanisms provided by Rails may not impacted, but applications that bypass the escaping mechanisms, or do not use them may be vulnerable." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Cross-site Scripting (XSS) - Stored (CWE-79)" } ] } ] }, "references": { "reference_data": [ { "name": "https://groups.google.com/forum/#!topic/rubyonrails-security/GKsAFT924Ag", "refsource": "MISC", "url": "https://groups.google.com/forum/#!topic/rubyonrails-security/GKsAFT924Ag" }, { "name": "[debian-lts-announce] 20181121 [SECURITY] [DLA 1585-1] ruby-rack security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2018/11/msg00022.html" }, { "name": "openSUSE-SU-2019:1553", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00032.html" }, { "name": "USN-4089-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4089-1/" }, { "name": "openSUSE-SU-2020:0214", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00016.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "assignerShortName": "hackerone", "cveId": "CVE-2018-16471", "datePublished": "2018-11-13T23:00:00", "dateReserved": "2018-09-04T00:00:00", "dateUpdated": "2024-08-05T10:24:32.587Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-26141
Vulnerability from cvelistv5
Published
2024-02-28 23:28
Modified
2024-08-28 17:55
Severity ?
EPSS score ?
Summary
Possible DoS Vulnerability with Range Header in Rack
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-01T23:59:32.578Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/rack/rack/security/advisories/GHSA-xj5v-6v4g-jfw6", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/rack/rack/security/advisories/GHSA-xj5v-6v4g-jfw6" }, { "name": "https://github.com/rack/rack/commit/4849132bef471adb21131980df745f4bb84de2d9", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/rack/rack/commit/4849132bef471adb21131980df745f4bb84de2d9" }, { "name": "https://github.com/rack/rack/commit/62457686b26d33a15a254c7768c2076e8e02b48b", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/rack/rack/commit/62457686b26d33a15a254c7768c2076e8e02b48b" }, { "name": "https://discuss.rubyonrails.org/t/possible-dos-vulnerability-with-range-header-in-rack/84944", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://discuss.rubyonrails.org/t/possible-dos-vulnerability-with-range-header-in-rack/84944" }, { "name": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2024-26141.yml", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2024-26141.yml" }, { "tags": [ "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00022.html" }, { "tags": [ "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20240510-0007/" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:a:rack_project:rack:*:*:*:*:*:ruby:*:*" ], "defaultStatus": "unknown", "product": "rack", "vendor": "rack_project", "versions": [ { "lessThan": "3.0.9.1", "status": "affected", "version": "3.0.0", "versionType": "custom" }, { "lessThan": "2.2.8.1", "status": "affected", "version": "1.3.0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-26141", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-03-05T18:23:59.367185Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-28T17:55:43.187Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "rack", "vendor": "rack", "versions": [ { "status": "affected", "version": "\u003e= 3.0.0, \u003c 3.0.9.1" }, { "status": "affected", "version": "\u003e= 1.3.0, \u003c 2.2.8.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Rack is a modular Ruby web server interface. Carefully crafted Range headers can cause a server to respond with an unexpectedly large response. Responding with such large responses could lead to a denial of service issue. Vulnerable applications will use the `Rack::File` middleware or the `Rack::Utils.byte_ranges` methods (this includes Rails applications). The vulnerability is fixed in 3.0.9.1 and 2.2.8.1." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-400", "description": "CWE-400: Uncontrolled Resource Consumption", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-02-28T23:28:10.503Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/rack/rack/security/advisories/GHSA-xj5v-6v4g-jfw6", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/rack/rack/security/advisories/GHSA-xj5v-6v4g-jfw6" }, { "name": "https://github.com/rack/rack/commit/4849132bef471adb21131980df745f4bb84de2d9", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/rack/rack/commit/4849132bef471adb21131980df745f4bb84de2d9" }, { "name": "https://github.com/rack/rack/commit/62457686b26d33a15a254c7768c2076e8e02b48b", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/rack/rack/commit/62457686b26d33a15a254c7768c2076e8e02b48b" }, { "name": "https://discuss.rubyonrails.org/t/possible-dos-vulnerability-with-range-header-in-rack/84944", "tags": [ "x_refsource_MISC" ], "url": "https://discuss.rubyonrails.org/t/possible-dos-vulnerability-with-range-header-in-rack/84944" }, { "name": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2024-26141.yml", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2024-26141.yml" }, { "url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00022.html" }, { "url": "https://security.netapp.com/advisory/ntap-20240510-0007/" } ], "source": { "advisory": "GHSA-xj5v-6v4g-jfw6", "discovery": "UNKNOWN" }, "title": "Possible DoS Vulnerability with Range Header in Rack" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-26141", "datePublished": "2024-02-28T23:28:10.503Z", "dateReserved": "2024-02-14T17:40:03.688Z", "dateUpdated": "2024-08-28T17:55:43.187Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-16470
Vulnerability from cvelistv5
Published
2018-11-13 23:00
Modified
2024-08-05 10:24
Severity ?
EPSS score ?
Summary
There is a possible DoS vulnerability in the multipart parser in Rack before 2.0.6. Specially crafted requests can cause the multipart parser to enter a pathological state, causing the parser to use CPU resources disproportionate to the request size.
References
▼ | URL | Tags |
---|---|---|
https://groups.google.com/forum/#%21msg/rubyonrails-security/U_x-YkfuVTg/xhvYAmp6AAAJ | x_refsource_MISC | |
https://access.redhat.com/errata/RHSA-2019:3172 | vendor-advisory, x_refsource_REDHAT |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T10:24:32.612Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://groups.google.com/forum/#%21msg/rubyonrails-security/U_x-YkfuVTg/xhvYAmp6AAAJ" }, { "name": "RHSA-2019:3172", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:3172" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Rack", "vendor": "Rack", "versions": [ { "status": "affected", "version": "2.0.6" } ] } ], "datePublic": "2018-11-05T00:00:00", "descriptions": [ { "lang": "en", "value": "There is a possible DoS vulnerability in the multipart parser in Rack before 2.0.6. Specially crafted requests can cause the multipart parser to enter a pathological state, causing the parser to use CPU resources disproportionate to the request size." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-400", "description": "Denial of Service (CWE-400)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2019-10-24T22:06:22", "orgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "shortName": "hackerone" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://groups.google.com/forum/#%21msg/rubyonrails-security/U_x-YkfuVTg/xhvYAmp6AAAJ" }, { "name": "RHSA-2019:3172", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2019:3172" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "support@hackerone.com", "ID": "CVE-2018-16470", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Rack", "version": { "version_data": [ { "version_value": "2.0.6" } ] } } ] }, "vendor_name": "Rack" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a possible DoS vulnerability in the multipart parser in Rack before 2.0.6. Specially crafted requests can cause the multipart parser to enter a pathological state, causing the parser to use CPU resources disproportionate to the request size." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Denial of Service (CWE-400)" } ] } ] }, "references": { "reference_data": [ { "name": "https://groups.google.com/forum/#!msg/rubyonrails-security/U_x-YkfuVTg/xhvYAmp6AAAJ", "refsource": "MISC", "url": "https://groups.google.com/forum/#!msg/rubyonrails-security/U_x-YkfuVTg/xhvYAmp6AAAJ" }, { "name": "RHSA-2019:3172", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:3172" } ] } } } }, "cveMetadata": { "assignerOrgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "assignerShortName": "hackerone", "cveId": "CVE-2018-16470", "datePublished": "2018-11-13T23:00:00", "dateReserved": "2018-09-04T00:00:00", "dateUpdated": "2024-08-05T10:24:32.612Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-25126
Vulnerability from cvelistv5
Published
2024-02-28 23:28
Modified
2024-08-12 17:43
Severity ?
EPSS score ?
Summary
Rack ReDos in content type parsing (2nd degree polynomial)
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-01T23:36:21.617Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/rack/rack/security/advisories/GHSA-22f2-v57c-j9cx", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/rack/rack/security/advisories/GHSA-22f2-v57c-j9cx" }, { "name": "https://github.com/rack/rack/commit/6efb2ceea003c4b195815a614e00438cbd543462", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/rack/rack/commit/6efb2ceea003c4b195815a614e00438cbd543462" }, { "name": "https://github.com/rack/rack/commit/d9c163a443b8cadf4711d84bd2c58cb9ef89cf49", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/rack/rack/commit/d9c163a443b8cadf4711d84bd2c58cb9ef89cf49" }, { "name": "https://discuss.rubyonrails.org/t/denial-of-service-vulnerability-in-rack-content-type-parsing/84941", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://discuss.rubyonrails.org/t/denial-of-service-vulnerability-in-rack-content-type-parsing/84941" }, { "name": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2024-25126.yml", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2024-25126.yml" }, { "tags": [ "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00022.html" }, { "tags": [ "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20240510-0005/" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:a:rack_project:rack:3.0.0:rc1:*:*:*:ruby:*:*" ], "defaultStatus": "unknown", "product": "rack", "vendor": "rack_project", "versions": [ { "lessThan": "3.0.9.1", "status": "affected", "version": "3.0.0", "versionType": "custom" }, { "lessThan": "2.2.8.1", "status": "affected", "version": "0.4", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-25126", "options": [ { "Exploitation": "poc" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-12T17:41:06.470602Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-12T17:43:32.571Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "rack", "vendor": "rack", "versions": [ { "status": "affected", "version": "\u003e= 3.0.0, \u003c 3.0.9.1" }, { "status": "affected", "version": "\u003e= 0.4, \u003c 2.2.8.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Rack is a modular Ruby web server interface. Carefully crafted content type headers can cause Rack\u2019s media type parser to take much longer than expected, leading to a possible denial of service vulnerability (ReDos 2nd degree polynomial). This vulnerability is patched in 3.0.9.1 and 2.2.8.1." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-1333", "description": "CWE-1333: Inefficient Regular Expression Complexity", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-02-28T23:28:07.073Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/rack/rack/security/advisories/GHSA-22f2-v57c-j9cx", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/rack/rack/security/advisories/GHSA-22f2-v57c-j9cx" }, { "name": "https://github.com/rack/rack/commit/6efb2ceea003c4b195815a614e00438cbd543462", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/rack/rack/commit/6efb2ceea003c4b195815a614e00438cbd543462" }, { "name": "https://github.com/rack/rack/commit/d9c163a443b8cadf4711d84bd2c58cb9ef89cf49", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/rack/rack/commit/d9c163a443b8cadf4711d84bd2c58cb9ef89cf49" }, { "name": "https://discuss.rubyonrails.org/t/denial-of-service-vulnerability-in-rack-content-type-parsing/84941", "tags": [ "x_refsource_MISC" ], "url": "https://discuss.rubyonrails.org/t/denial-of-service-vulnerability-in-rack-content-type-parsing/84941" }, { "name": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2024-25126.yml", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2024-25126.yml" }, { "url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00022.html" }, { "url": "https://security.netapp.com/advisory/ntap-20240510-0005/" } ], "source": { "advisory": "GHSA-22f2-v57c-j9cx", "discovery": "UNKNOWN" }, "title": "Rack ReDos in content type parsing (2nd degree polynomial)" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-25126", "datePublished": "2024-02-28T23:28:07.073Z", "dateReserved": "2024-02-05T14:14:46.381Z", "dateUpdated": "2024-08-12T17:43:32.571Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-16782
Vulnerability from cvelistv5
Published
2019-12-18 19:05
Modified
2024-08-05 01:24
Severity ?
EPSS score ?
Summary
Possible Information Leak / Session Hijack Vulnerability in Rack
References
▼ | URL | Tags |
---|---|---|
https://github.com/rack/rack/security/advisories/GHSA-hrqr-hxpp-chr3 | x_refsource_CONFIRM | |
https://github.com/rack/rack/commit/7fecaee81f59926b6e1913511c90650e76673b38 | x_refsource_CONFIRM | |
http://www.openwall.com/lists/oss-security/2019/12/18/3 | mailing-list, x_refsource_MLIST | |
http://www.openwall.com/lists/oss-security/2019/12/18/2 | mailing-list, x_refsource_MLIST | |
http://www.openwall.com/lists/oss-security/2019/12/19/3 | mailing-list, x_refsource_MLIST | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HZXMWILCICQLA2BYSP6I2CRMUG53YBLX/ | vendor-advisory, x_refsource_FEDORA | |
http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00016.html | vendor-advisory, x_refsource_SUSE | |
http://www.openwall.com/lists/oss-security/2020/04/08/1 | mailing-list, x_refsource_MLIST | |
http://www.openwall.com/lists/oss-security/2020/04/09/2 | mailing-list, x_refsource_MLIST |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T01:24:48.031Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/rack/rack/security/advisories/GHSA-hrqr-hxpp-chr3" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/rack/rack/commit/7fecaee81f59926b6e1913511c90650e76673b38" }, { "name": "[oss-security] 20191219 Re: [CVE-2019-16782] Possible Information Leak / Session Hijack Vulnerability in Rack", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2019/12/18/3" }, { "name": "[oss-security] 20191218 [CVE-2019-16782] Possible Information Leak / Session Hijack Vulnerability in Rack", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2019/12/18/2" }, { "name": "[oss-security] 20191218 Re: [CVE-2019-16782] Possible Information Leak / Session Hijack Vulnerability in Rack", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2019/12/19/3" }, { "name": "FEDORA-2020-57fc0d0156", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HZXMWILCICQLA2BYSP6I2CRMUG53YBLX/" }, { "name": "openSUSE-SU-2020:0214", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00016.html" }, { "name": "[oss-security] 20200409 Re: [CVE-2019-16782] Possible Information Leak / Session Hijack Vulnerability in Rack", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2020/04/08/1" }, { "name": "[oss-security] 20200408 Re: [CVE-2019-16782] Possible Information Leak / Session Hijack Vulnerability in Rack", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2020/04/09/2" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "rack", "vendor": "rack", "versions": [ { "status": "affected", "version": "before 1.6.12 or 2.0.8" } ] } ], "descriptions": [ { "lang": "en", "value": "There\u0027s a possible information leak / session hijack vulnerability in Rack (RubyGem rack). This vulnerability is patched in versions 1.6.12 and 2.0.8. Attackers may be able to find and hijack sessions by using timing attacks targeting the session id. Session ids are usually stored and indexed in a database that uses some kind of scheme for speeding up lookups of that session id. By carefully measuring the amount of time it takes to look up a session, an attacker may be able to find a valid session id and hijack the session. The session id itself may be generated randomly, but the way the session is indexed by the backing store does not use a secure comparison." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-208", "description": "CWE-208 Information Exposure Through Timing Discrepancy", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-04-09T14:06:01", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/rack/rack/security/advisories/GHSA-hrqr-hxpp-chr3" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/rack/rack/commit/7fecaee81f59926b6e1913511c90650e76673b38" }, { "name": "[oss-security] 20191219 Re: [CVE-2019-16782] Possible Information Leak / Session Hijack Vulnerability in Rack", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2019/12/18/3" }, { "name": "[oss-security] 20191218 [CVE-2019-16782] Possible Information Leak / Session Hijack Vulnerability in Rack", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2019/12/18/2" }, { "name": "[oss-security] 20191218 Re: [CVE-2019-16782] Possible Information Leak / Session Hijack Vulnerability in Rack", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2019/12/19/3" }, { "name": "FEDORA-2020-57fc0d0156", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HZXMWILCICQLA2BYSP6I2CRMUG53YBLX/" }, { "name": "openSUSE-SU-2020:0214", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00016.html" }, { "name": "[oss-security] 20200409 Re: [CVE-2019-16782] Possible Information Leak / Session Hijack Vulnerability in Rack", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2020/04/08/1" }, { "name": "[oss-security] 20200408 Re: [CVE-2019-16782] Possible Information Leak / Session Hijack Vulnerability in Rack", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2020/04/09/2" } ], "source": { "advisory": "GHSA-hrqr-hxpp-chr3", "discovery": "UNKNOWN" }, "title": "Possible Information Leak / Session Hijack Vulnerability in Rack", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2019-16782", "STATE": "PUBLIC", "TITLE": "Possible Information Leak / Session Hijack Vulnerability in Rack" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "rack", "version": { "version_data": [ { "version_value": "before 1.6.12 or 2.0.8" } ] } } ] }, "vendor_name": "rack" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There\u0027s a possible information leak / session hijack vulnerability in Rack (RubyGem rack). This vulnerability is patched in versions 1.6.12 and 2.0.8. Attackers may be able to find and hijack sessions by using timing attacks targeting the session id. Session ids are usually stored and indexed in a database that uses some kind of scheme for speeding up lookups of that session id. By carefully measuring the amount of time it takes to look up a session, an attacker may be able to find a valid session id and hijack the session. The session id itself may be generated randomly, but the way the session is indexed by the backing store does not use a secure comparison." } ] }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-208 Information Exposure Through Timing Discrepancy" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/rack/rack/security/advisories/GHSA-hrqr-hxpp-chr3", "refsource": "CONFIRM", "url": "https://github.com/rack/rack/security/advisories/GHSA-hrqr-hxpp-chr3" }, { "name": "https://github.com/rack/rack/commit/7fecaee81f59926b6e1913511c90650e76673b38", "refsource": "CONFIRM", "url": "https://github.com/rack/rack/commit/7fecaee81f59926b6e1913511c90650e76673b38" }, { "name": "[oss-security] 20191219 Re: [CVE-2019-16782] Possible Information Leak / Session Hijack Vulnerability in Rack", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2019/12/18/3" }, { "name": "[oss-security] 20191218 [CVE-2019-16782] Possible Information Leak / Session Hijack Vulnerability in Rack", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2019/12/18/2" }, { "name": "[oss-security] 20191218 Re: [CVE-2019-16782] Possible Information Leak / Session Hijack Vulnerability in Rack", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2019/12/19/3" }, { "name": "FEDORA-2020-57fc0d0156", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZXMWILCICQLA2BYSP6I2CRMUG53YBLX/" }, { "name": "openSUSE-SU-2020:0214", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00016.html" }, { "name": "[oss-security] 20200409 Re: [CVE-2019-16782] Possible Information Leak / Session Hijack Vulnerability in Rack", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2020/04/08/1" }, { "name": "[oss-security] 20200408 Re: [CVE-2019-16782] Possible Information Leak / Session Hijack Vulnerability in Rack", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2020/04/09/2" } ] }, "source": { "advisory": "GHSA-hrqr-hxpp-chr3", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2019-16782", "datePublished": "2019-12-18T19:05:14", "dateReserved": "2019-09-24T00:00:00", "dateUpdated": "2024-08-05T01:24:48.031Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-39316
Vulnerability from cvelistv5
Published
2024-07-02 15:57
Modified
2024-08-02 04:19
Severity ?
EPSS score ?
Summary
Rack ReDoS Vulnerability in HTTP Accept Headers Parsing
References
▼ | URL | Tags |
---|---|---|
https://github.com/rack/rack/security/advisories/GHSA-cj83-2ww7-mvq7 | x_refsource_CONFIRM | |
https://github.com/rack/rack/security/advisories/GHSA-54rr-7fvw-6x8f | x_refsource_MISC | |
https://github.com/rack/rack/commit/412c980450ca729ee37f90a2661f166a9665e058 | x_refsource_MISC |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-39316", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-07-03T13:50:23.901915Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-03T20:09:58.349Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T04:19:20.629Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/rack/rack/security/advisories/GHSA-cj83-2ww7-mvq7", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/rack/rack/security/advisories/GHSA-cj83-2ww7-mvq7" }, { "name": "https://github.com/rack/rack/security/advisories/GHSA-54rr-7fvw-6x8f", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/rack/rack/security/advisories/GHSA-54rr-7fvw-6x8f" }, { "name": "https://github.com/rack/rack/commit/412c980450ca729ee37f90a2661f166a9665e058", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/rack/rack/commit/412c980450ca729ee37f90a2661f166a9665e058" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "rack", "vendor": "rack", "versions": [ { "status": "affected", "version": "\u003e= 3.1.0, \u003c 3.1.5" } ] } ], "descriptions": [ { "lang": "en", "value": "Rack is a modular Ruby web server interface. Starting in version 3.1.0 and prior to version 3.1.5, Regular Expression Denial of Service (ReDoS) vulnerability exists in the `Rack::Request::Helpers` module when parsing HTTP Accept headers. This vulnerability can be exploited by an attacker sending specially crafted `Accept-Encoding` or `Accept-Language` headers, causing the server to spend excessive time processing the request and leading to a Denial of Service (DoS). The fix for CVE-2024-26146 was not applied to the main branch and thus while the issue was fixed for the Rack v3.0 release series, it was not fixed in the v3.1 release series until v3.1.5. Users of versions on the 3.1 branch should upgrade to version 3.1.5 to receive the fix." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-1333", "description": "CWE-1333: Inefficient Regular Expression Complexity", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-07-02T15:57:39.107Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/rack/rack/security/advisories/GHSA-cj83-2ww7-mvq7", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/rack/rack/security/advisories/GHSA-cj83-2ww7-mvq7" }, { "name": "https://github.com/rack/rack/security/advisories/GHSA-54rr-7fvw-6x8f", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/rack/rack/security/advisories/GHSA-54rr-7fvw-6x8f" }, { "name": "https://github.com/rack/rack/commit/412c980450ca729ee37f90a2661f166a9665e058", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/rack/rack/commit/412c980450ca729ee37f90a2661f166a9665e058" } ], "source": { "advisory": "GHSA-cj83-2ww7-mvq7", "discovery": "UNKNOWN" }, "title": "Rack ReDoS Vulnerability in HTTP Accept Headers Parsing" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-39316", "datePublished": "2024-07-02T15:57:39.107Z", "dateReserved": "2024-06-21T18:15:22.261Z", "dateUpdated": "2024-08-02T04:19:20.629Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }