CVE-2023-27539 – rack
Package
Manager: gem
Name: rack
Vulnerable Version: >=2.0.0 <2.2.6.4 || >=3.0.0 <3.0.6.1
Severity
Level: Low
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:U/RC:R
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
EPSS: 0.00242 pctl0.47361
Details
Possible Denial of Service Vulnerability in Rack's header parsing There is a denial of service vulnerability in the header parsing component of Rack. This vulnerability has been assigned the CVE identifier CVE-2023-27539. Versions Affected: >= 2.0.0 Not affected: None. Fixed Versions: 2.2.6.4, 3.0.6.1 # Impact Carefully crafted input can cause header parsing in Rack to take an unexpected amount of time, possibly resulting in a denial of service attack vector. Any applications that parse headers using Rack (virtually all Rails applications) are impacted. # Workarounds Setting Regexp.timeout in Ruby 3.2 is a possible workaround.
Metadata
Created: 2023-03-15T21:36:02Z
Modified: 2025-01-09T15:36:58Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/03/GHSA-c6qg-cjj8-47qp/GHSA-c6qg-cjj8-47qp.json
CWE IDs: []
Alternative ID: GHSA-c6qg-cjj8-47qp
Finding: F002
Auto approve: 1