Lucene search

K
rubygemsRubySecRUBY:RACK-2024-26141
HistoryFeb 20, 2024 - 9:00 p.m.

Possible DoS Vulnerability with Range Header in Rack

2024-02-2021:00:00
RubySec
rubysec.com
10
dos
vulnerability
range header
rack
cve-2024-26141
versions affected
fixed versions
impact
vulnerable applications
releases
workarounds
software

5.8 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L

7 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

10.3%

There is a possible DoS vulnerability relating to the Range request header in
Rack. This vulnerability has been assigned the CVE identifier CVE-2024-26141.

Versions Affected: >= 1.3.0. Not affected: < 1.3.0 Fixed Versions: 3.0.9.1, 2.2.8.1

Impact

Carefully crafted Range headers can cause a server to respond with an
unexpectedly large response. Responding with such large responses could lead
to a denial of service issue.

Vulnerable applications will use the Rack::File middleware or the
Rack::Utils.byte_ranges methods (this includes Rails applications).

Releases

The fixed releases are available at the normal locations.

Workarounds

There are no feasible workarounds for this issue.

CPENameOperatorVersion
racklt1.3.0
rackle2.2.8.0
rackge2.2.9.0
racklt3.0.9.1

5.8 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L

7 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

10.3%