-
-
Notifications
You must be signed in to change notification settings - Fork 220
/
Copy pathCVE-2024-25126.yml
59 lines (46 loc) · 1.65 KB
/
CVE-2024-25126.yml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
---
gem: rack
cve: 2024-25126
ghsa: 22f2-v57c-j9cx
url: https://discuss.rubyonrails.org/t/denial-of-service-vulnerability-in-rack-content-type-parsing/84941
title: Denial of Service Vulnerability in Rack Content-Type Parsing
date: 2024-02-21
description: |
There is a possible denial of service vulnerability in the content type
parsing component of Rack. This vulnerability has been assigned the CVE
identifier CVE-2024-25126.
Versions Affected: >= 0.4 Not affected: < 0.4 Fixed Versions: 3.0.9.1, 2.2.8.1
# Impact
Carefully crafted content type headers can cause Rack’s media type parser to
take much longer than expected, leading to a possible denial of service
vulnerability.
Impacted code will use Rack’s media type parser to parse content type headers.
This code will look like below:
```
request.media_type
## OR
request.media_type_params
## OR
Rack::MediaType.type(content_type)
```
Some frameworks (including Rails) call this code internally, so upgrading is
recommended!
All users running an affected release should either upgrade or use one of the
workarounds immediately.
# Releases
The fixed releases are available at the normal locations.
# Workarounds
There are no feasible workarounds for this issue.
cvss_v3: 5.3
unaffected_versions:
- "< 0.4"
patched_versions:
- "~> 2.2.8, >= 2.2.8.1"
- ">= 3.0.9.1"
related:
url:
- https://github.com/rack/rack/releases/tag/v3.0.9.1
- https://github.com/rack/rack/releases/tag/v2.2.8.1
- https://nvd.nist.gov/vuln/detail/CVE-2024-25126
- https://access.redhat.com/security/cve/cve-2024-25126
- https://ubuntu.com/security/CVE-2024-25126