Lucene search

K
rubygemsRubySecRUBY:RACK-2023-27539
HistoryMar 12, 2023 - 9:00 p.m.

Possible Denial of Service Vulnerability in Rack’s header parsing

2023-03-1221:00:00
RubySec
rubysec.com
9
denial of service
header parsing
rack
cve-2023-27539
vulnerability
workaround
regexp.timeout
ruby 3.2
attack vector
impact

There is a denial of service vulnerability in the header parsing component of Rack. This vulnerability has been assigned the CVE identifier CVE-2023-27539.

Versions Affected: >= 2.0.0 Not affected: None. Fixed Versions: 2.2.6.4, 3.0.6.1

Impact

Carefully crafted input can cause header parsing in Rack to take an unexpected amount of time, possibly resulting in a denial of service attack vector. Any applications that parse headers using Rack (virtually all Rails applications) are impacted.

Workarounds

Setting Regexp.timeout in Ruby 3.2 is a possible workaround.

CPENameOperatorVersion
rackle2.2.6.3
rackge2.2.7.0
racklt3.0.6.1