logo

CVE-2024-39316 rack

Package

Manager: gem
Name: rack
Vulnerable Version: >=3.1.0 <3.1.5

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

EPSS: 0.00268 pctl0.50058

Details

Rack ReDoS Vulnerability in HTTP Accept Headers Parsing ### Summary A Regular Expression Denial of Service (ReDoS) vulnerability exists in the `Rack::Request::Helpers` module when parsing HTTP Accept headers. This vulnerability can be exploited by an attacker sending specially crafted `Accept-Encoding` or `Accept-Language` headers, causing the server to spend excessive time processing the request and leading to a Denial of Service (DoS). ### Details The fix for https://github.com/rack/rack/security/advisories/GHSA-54rr-7fvw-6x8f was not applied to the main branch and thus while the issue was fixed for the Rack v3.0 release series, it was not fixed in the v3.1 release series until v3.1.5.

Metadata

Created: 2024-07-03T17:03:45Z
Modified: 2024-11-05T18:12:49Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/07/GHSA-cj83-2ww7-mvq7/GHSA-cj83-2ww7-mvq7.json
CWE IDs: ["CWE-1333"]
Alternative ID: GHSA-cj83-2ww7-mvq7
Finding: F211
Auto approve: 1