Lucene search

K
vulnrichmentGitHub_MVULNRICHMENT:CVE-2024-26146
HistoryFeb 28, 2024 - 11:28 p.m.

CVE-2024-26146 Possible Denial of Service Vulnerability in Rack Header Parsing

2024-02-2823:28:01
CWE-1333
GitHub_M
github.com
5
cve-2024-26146
denial of service
rack
header parsing
vulnerability
ruby 3.2

CVSS3

5.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

AI Score

6.6

Confidence

High

SSVC

Exploitation

none

Automatable

yes

Technical Impact

partial

Rack is a modular Ruby web server interface. Carefully crafted headers can cause header parsing in Rack to take longer than expected resulting in a possible denial of service issue. Accept and Forwarded headers are impacted. Ruby 3.2 has mitigations for this problem, so Rack applications using Ruby 3.2 or newer are unaffected. This vulnerability is fixed in 2.0.9.4, 2.1.4.4, 2.2.8.1, and 3.0.9.1.

CNA Affected

[
  {
    "vendor": "rack",
    "product": "rack",
    "versions": [
      {
        "status": "affected",
        "version": ">= 3.0.0, < 3.0.9.1"
      },
      {
        "status": "affected",
        "version": ">= 2.2.0, < 2.2.8.1"
      },
      {
        "status": "affected",
        "version": ">= 2.1.0, < 2.1.4.4"
      },
      {
        "status": "affected",
        "version": "< 2.0.9.4"
      }
    ]
  }
]

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:a:rack_project:rack:2.2.0:*:*:*:*:ruby:*:*",
      "cpe:2.3:a:rack_project:rack:2.1.0:*:*:*:*:ruby:*:*",
      "cpe:2.3:a:rack_project:rack:3.0.0:-:*:*:*:ruby:*:*"
    ],
    "vendor": "rack_project",
    "product": "rack",
    "versions": [
      {
        "status": "affected",
        "version": "2.1.0",
        "lessThan": "2.1.4.4",
        "versionType": "custom"
      },
      {
        "status": "affected",
        "version": "2.2.0",
        "lessThan": "2.2.8.1",
        "versionType": "custom"
      },
      {
        "status": "affected",
        "version": "3.0.0",
        "lessThan": "3.0.9.1",
        "versionType": "custom"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:a:rack_project:rack:*:*:*:*:*:ruby:*:*"
    ],
    "vendor": "rack_project",
    "product": "rack",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "lessThan": "2.0.9.4",
        "versionType": "custom"
      }
    ],
    "defaultStatus": "unknown"
  }
]

CVSS3

5.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

AI Score

6.6

Confidence

High

SSVC

Exploitation

none

Automatable

yes

Technical Impact

partial