CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L
AI Score
Confidence
High
EPSS
Percentile
10.3%
There is a possible DoS vulnerability relating to the Range request header in
Rack. This vulnerability has been assigned the CVE identifier CVE-2024-26141.
Versions Affected: >= 1.3.0.
Not affected: < 1.3.0
Fixed Versions: 3.0.9.1, 2.2.8.1
Carefully crafted Range headers can cause a server to respond with an
unexpectedly large response. Responding with such large responses could lead
to a denial of service issue.
Vulnerable applications will use the Rack::File
middleware or the
Rack::Utils.byte_ranges
methods (this includes Rails applications).
The fixed releases are available at the normal locations.
There are no feasible workarounds for this issue.
To aid users who aren’t able to upgrade immediately we have provided patches for
the two supported release series. They are in git-am format and consist of a
single changeset.
Thank you ooooooo_q for the report and
patch
discuss.rubyonrails.org/t/possible-dos-vulnerability-with-range-header-in-rack/84944
github.com/advisories/GHSA-xj5v-6v4g-jfw6
github.com/rack/rack/commit/4849132bef471adb21131980df745f4bb84de2d9
github.com/rack/rack/commit/62457686b26d33a15a254c7768c2076e8e02b48b
github.com/rack/rack/security/advisories/GHSA-xj5v-6v4g-jfw6
github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2024-26141.yml
nvd.nist.gov/vuln/detail/CVE-2024-26141