Page 4 of 20 results (0.018 seconds)

CVSS: 4.3EPSS: 1%CPEs: 23EXPL: 0

Unspecified vulnerability in Rack::Auth::AbstractRequest in Rack 1.1.x before 1.1.5, 1.2.x before 1.2.7, 1.3.x before 1.3.9, and 1.4.x before 1.4.4 allows remote attackers to cause a denial of service via unknown vectors related to "symbolized arbitrary strings." Vulnerabilidad no especificada en Rack::Auth::AbstractRequest en Rack v1.1.x anterior a v1.1.5, v1.2.x anterior a v1.2.7, v1.3.x anterior a v1.3.9, y v1.4.x anterior a v1.4.4, permite a atacantes remotos provocar una denegación de servicio a través de vectores desconocidos relacionados con "symbolized arbitrary strings." • http://lists.opensuse.org/opensuse-updates/2013-03/msg00048.html http://rhn.redhat.com/errata/RHSA-2013-0544.html http://rhn.redhat.com/errata/RHSA-2013-0548.html http://www.debian.org/security/2013/dsa-2783 https://bugzilla.redhat.com/show_bug.cgi?id=895384 https://access.redhat.com/security/cve/CVE-2013-0184 • CWE-400: Uncontrolled Resource Consumption •

CVSS: 5.0EPSS: 4%CPEs: 11EXPL: 0

multipart/parser.rb in Rack 1.3.x before 1.3.8 and 1.4.x before 1.4.3 allows remote attackers to cause a denial of service (memory consumption and out-of-memory error) via a long string in a Multipart HTTP packet. multipart/parser.rb de Rack v1.3.x antes de v1.3.8 y v1.4.x antes de v1.4.3 permite a atacantes remotos causar una denegación de servicios (consumo de memoria y accesos fuera de rango) usando un long string en un paquete Multipart HTTP. • http://lists.opensuse.org/opensuse-updates/2013-03/msg00048.html http://rack.github.com http://rhn.redhat.com/errata/RHSA-2013-0544.html http://rhn.redhat.com/errata/RHSA-2013-0548.html http://www.debian.org/security/2013/dsa-2783 https://bugzilla.redhat.com/show_bug.cgi?id=895282 https://github.com/rack/rack/commit/548b9af2dc0059f4c0c19728624448d84de450ff https://github.com/rack/rack/commit/f95113402b7239f225282806673e1b6424522b18 https://groups.google.com/forum/#%21topic/rack-devel/-M • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-400: Uncontrolled Resource Consumption •

CVSS: 4.3EPSS: 0%CPEs: 7EXPL: 0

rack/file.rb (Rack::File) in Rack 1.5.x before 1.5.2 and 1.4.x before 1.4.5 allows attackers to access arbitrary files outside the intended root directory via a crafted PATH_INFO environment variable, probably a directory traversal vulnerability that is remotely exploitable, aka "symlink path traversals." rack/file.rb (Rack::File) en Rack v1.5.x anterior a v1.5.2 y v1.4.x anterior a v1.4.5 permite a atacantes acceder a ficheros arbitrarios fuera del directorio raiz mediante una variable de entorno PATH_INFO especialmente diseñada, posiblemente una vulnerabilidad de salto de directorio remotamente explotable, también conocido como "salto de directorio symlink". • http://lists.opensuse.org/opensuse-updates/2013-03/msg00048.html http://rack.github.com http://secunia.com/advisories/52033 https://bugzilla.redhat.com/show_bug.cgi?id=909071 https://bugzilla.redhat.com/show_bug.cgi?id=909072 https://gist.github.com/rentzsch/4736940 https://github.com/rack/rack/blob/master/lib/rack/file.rb#L56 https://github.com/rack/rack/commit/6f237e4c9fab649d3750482514f0fde76c56ab30 https://groups.google.com/forum/#%21msg/rack-devel/bf937jPZxJM/1s6x95vIhmAJ https&# • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 5.1EPSS: 8%CPEs: 28EXPL: 0

Rack::Session::Cookie in Rack 1.5.x before 1.5.2, 1.4.x before 1.4.5, 1.3.x before 1.3.10, 1.2.x before 1.2.8, and 1.1.x before 1.1.6 allows remote attackers to guess the session cookie, gain privileges, and execute arbitrary code via a timing attack involving an HMAC comparison function that does not run in constant time. Rack::Sesión::Cookie en rack v1.5.x antes de v1.5.2, v1.4.x antes de v1.4.5, v1.3.x antes de v1.3.10, v1.2.x antes de v1.2.8, antes de v1.1.x y v1.1.6 permite atacantes remotos para adivinar la cookie de sesión, los privilegios de ganancia, y ejecutar código arbitrario a través de un ataque de sincronización que implica una función de comparación HMAC que no se ejecuta en tiempo constante. • http://lists.opensuse.org/opensuse-updates/2013-03/msg00048.html http://rack.github.com http://rhn.redhat.com/errata/RHSA-2013-0686.html http://secunia.com/advisories/52033 http://secunia.com/advisories/52134 http://secunia.com/advisories/52774 http://www.debian.org/security/2013/dsa-2783 http://www.osvdb.org/89939 https://bugzilla.redhat.com/show_bug.cgi?id=909071 https://gist.github.com/codahale/f9f3781f7b54985bee94 https://github.com/rack/rack/commit/0cd7e9aa397f8ebb3b8481 •

CVSS: 5.0EPSS: 0%CPEs: 12EXPL: 1

Rack before 1.1.3, 1.2.x before 1.2.5, and 1.3.x before 1.3.6 computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters. Rack anterior a v1.1.3, v1.2.x anterior a v1.2.5, v1.3.6 y v1.3.x calcula los valores hash de los parámetros de forma, sin restringir la capacidad de desencadenar colisiones hash predecible, lo que permite a atacantes remotos provocar una denegación de servicio (CPU consumo) mediante el envío de gran cantidad de parámetros a mano. • http://archives.neohapsis.com/archives/bugtraq/2011-12/0181.html http://www.debian.org/security/2013/dsa-2783 http://www.kb.cert.org/vuls/id/903934 http://www.nruns.com/_downloads/advisory28122011.pdf http://www.ocert.org/advisories/ocert-2011-003.html https://gist.github.com/52bbc6b9cc19ce330829 • CWE-310: Cryptographic Issues •