5.8 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L
6.9 Medium
AI Score
Confidence
High
0.0004 Low
EPSS
Percentile
10.3%
Rack is vulnerable to Denial of Service (DoS). The vulnerability is due to improper handling of Range headers, allowing an attacker to craft headers in a way that results in an unexpectedly large response, which can result in Denial of Service (DoS).
CPE | Name | Operator | Version |
---|---|---|---|
rack | le | 2.2.8 | |
rack | le | 3.0.9 | |
ruby-rack:sid | eq | 2.1.4-3 | |
ruby-rack:sid | eq | 2.1.1-5 | |
ruby-rack:bullseye | eq | 2.1.1-5 | |
rack | le | 2.2.8 | |
rack | le | 3.0.9 | |
ruby-rack:sid | eq | 2.1.4-3 | |
ruby-rack:sid | eq | 2.1.1-5 | |
ruby-rack:bullseye | eq | 2.1.1-5 |
discuss.rubyonrails.org/t/possible-dos-vulnerability-with-range-header-in-rack/84944
github.com/advisories/GHSA-xj5v-6v4g-jfw6
github.com/rack/rack/commit/4849132bef471adb21131980df745f4bb84de2d9
github.com/rack/rack/commit/62457686b26d33a15a254c7768c2076e8e02b48b
github.com/rack/rack/security/advisories/GHSA-xj5v-6v4g-jfw6
github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2024-26141.yml
lists.debian.org/debian-lts-announce/2024/04/msg00022.html
security.netapp.com/advisory/ntap-20240510-0007/
5.8 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L
6.9 Medium
AI Score
Confidence
High
0.0004 Low
EPSS
Percentile
10.3%