29 results (0.002 seconds)

CVSS: 7.8EPSS: 0%CPEs: 3EXPL: 0

10 Mar 2025 — Rack provides an interface for developing web applications in Ruby. Prior to versions 2.2.13, 3.0.14, and 3.1.12, `Rack::Static` can serve files under the specified `root:` even if `urls:` are provided, which may expose other files under the specified `root:` unexpectedly. The vulnerability occurs because `Rack::Static` does not properly sanitize user-supplied paths before serving files. Specifically, encoded path traversal sequences are not correctly validated, allowing attackers to access files outside th... • https://github.com/rack/rack/commit/50caab74fa01ee8f5dbdee7bb2782126d20c6583 • CWE-23: Relative Path Traversal •

CVSS: 9.8EPSS: 0%CPEs: 3EXPL: 0

04 Mar 2025 — Rack is a modular Ruby web server interface. The Rack::Sendfile middleware logs unsanitised header values from the X-Sendfile-Type header. An attacker can exploit this by injecting escape sequences (such as newline characters) into the header, resulting in log injection. This vulnerability is fixed in 2.2.12, 3.0.13, and 3.1.11. Nhật Thái Đỗ discovered that Rack incorrectly handled certain usernames. • https://github.com/rack/rack/commit/803aa221e8302719715e224f4476e438f2531a53 • CWE-93: Improper Neutralization of CRLF Sequences ('CRLF Injection') CWE-117: Improper Output Neutralization for Logs •

CVSS: 9.8EPSS: 0%CPEs: 3EXPL: 0

12 Feb 2025 — Rack provides an interface for developing web applications in Ruby. Prior to versions 2.2.11, 3.0.12, and 3.1.11, Rack::CommonLogger can be exploited by crafting input that includes newline characters to manipulate log entries. The supplied proof-of-concept demonstrates injecting malicious content into logs. When a user provides the authorization credentials via Rack::Auth::Basic, if success, the username will be put in env['REMOTE_USER'] and later be used by Rack::CommonLogger for logging purposes. The iss... • https://github.com/rack/rack/commit/074ae244430cda05c27ca91cda699709cfb3ad8e • CWE-93: Improper Neutralization of CRLF Sequences ('CRLF Injection') CWE-117: Improper Output Neutralization for Logs •

CVSS: 6.8EPSS: 0%CPEs: 1EXPL: 0

02 Jul 2024 — Rack is a modular Ruby web server interface. Starting in version 3.1.0 and prior to version 3.1.5, Regular Expression Denial of Service (ReDoS) vulnerability exists in the `Rack::Request::Helpers` module when parsing HTTP Accept headers. This vulnerability can be exploited by an attacker sending specially crafted `Accept-Encoding` or `Accept-Language` headers, causing the server to spend excessive time processing the request and leading to a Denial of Service (DoS). The fix for CVE-2024-26146 was not applie... • https://github.com/rack/rack/commit/412c980450ca729ee37f90a2661f166a9665e058 • CWE-1333: Inefficient Regular Expression Complexity •

CVSS: 8.6EPSS: 0%CPEs: 1EXPL: 0

27 May 2024 — rack-contrib provides contributed rack middleware and utilities for Rack, a Ruby web server interface. Versions of rack-contrib prior to 2.5.0 are vulnerable to denial of service due to the fact that the user controlled data `profiler_runs` was not constrained to any limitation. This would lead to allocating resources on the server side with no limitation and a potential denial of service by remotely user-controlled data. Version 2.5.0 contains a patch for the issue. rack-contrib proporciona middleware y ut... • https://github.com/rack/rack-contrib/commit/0eec2a9836329051c6742549e65a94a4c24fe6f7 • CWE-770: Allocation of Resources Without Limits or Throttling •

CVSS: 7.8EPSS: 4%CPEs: 2EXPL: 0

28 Feb 2024 — Rack is a modular Ruby web server interface. Carefully crafted Range headers can cause a server to respond with an unexpectedly large response. Responding with such large responses could lead to a denial of service issue. Vulnerable applications will use the `Rack::File` middleware or the `Rack::Utils.byte_ranges` methods (this includes Rails applications). The vulnerability is fixed in 3.0.9.1 and 2.2.8.1. • https://discuss.rubyonrails.org/t/possible-dos-vulnerability-with-range-header-in-rack/84944 • CWE-400: Uncontrolled Resource Consumption CWE-1333: Inefficient Regular Expression Complexity •

CVSS: 7.8EPSS: 4%CPEs: 2EXPL: 0

28 Feb 2024 — Rack is a modular Ruby web server interface. Carefully crafted content type headers can cause Rack’s media type parser to take much longer than expected, leading to a possible denial of service vulnerability (ReDos 2nd degree polynomial). This vulnerability is patched in 3.0.9.1 and 2.2.8.1. Rack es una interfaz modular de servidor web Ruby. Los encabezados de tipo de contenido cuidadosamente elaborados pueden hacer que el analizador de tipo de medios de Rack demore mucho más de lo esperado, lo que lleva a ... • https://discuss.rubyonrails.org/t/denial-of-service-vulnerability-in-rack-content-type-parsing/84941 • CWE-1333: Inefficient Regular Expression Complexity •

CVSS: 5.3EPSS: 28%CPEs: 4EXPL: 0

28 Feb 2024 — Rack is a modular Ruby web server interface. Carefully crafted headers can cause header parsing in Rack to take longer than expected resulting in a possible denial of service issue. Accept and Forwarded headers are impacted. Ruby 3.2 has mitigations for this problem, so Rack applications using Ruby 3.2 or newer are unaffected. This vulnerability is fixed in 2.0.9.4, 2.1.4.4, 2.2.8.1, and 3.0.9.1. • https://discuss.rubyonrails.org/t/possible-denial-of-service-vulnerability-in-rack-header-parsing/84942 • CWE-1333: Inefficient Regular Expression Complexity •

CVSS: 9.1EPSS: 0%CPEs: 1EXPL: 0

26 Feb 2024 — rack-cors (aka Rack CORS Middleware) 2.0.1 has 0666 permissions for the .rb files. rack-cors (también conocido como Rack CORS Middleware) 2.0.1 tiene permisos 0666 para los archivos .rb. • https://github.com/cyu/rack-cors/issues/274 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 7.8EPSS: 5%CPEs: 6EXPL: 0

10 Mar 2023 — A DoS vulnerability exists in Rack