CVE-2022-44572

A denial of service vulnerability in the multipart parsing component of Rack fixed in 2.0.9.2, 2.1.4.2, 2.2.4.1 and 3.0.0.1 could allow an attacker tocraft input that can cause RFC2183 multipart boundary parsing in Rack to take an unexpected amount of time, possibly resulting in a denial of service attack vector. Any applications that parse multipart posts using Rack (virtually all Rails applications) are impacted.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:rack_project:rack:*:*:*:*:*:ruby:*:*
cpe:2.3:a:rack_project:rack:*:*:*:*:*:ruby:*:*
cpe:2.3:a:rack_project:rack:*:*:*:*:*:ruby:*:*

History

21 Nov 2024, 07:28

Type Values Removed Values Added
References () https://hackerone.com/reports/1639882 - Permissions Required, Third Party Advisory () https://hackerone.com/reports/1639882 - Permissions Required, Third Party Advisory
References () https://security.netapp.com/advisory/ntap-20231208-0014/ - () https://security.netapp.com/advisory/ntap-20231208-0014/ -
References () https://www.debian.org/security/2023/dsa-5530 - () https://www.debian.org/security/2023/dsa-5530 -

22 Oct 2023, 19:15

Type Values Removed Values Added
References
  • (DEBIAN) https://www.debian.org/security/2023/dsa-5530 -

Information

Published : 2023-02-09 20:15

Updated : 2024-11-21 07:28


NVD link : CVE-2022-44572

Mitre link : CVE-2022-44572

CVE.ORG link : CVE-2022-44572


JSON object : View

Products Affected

rack_project

  • rack
CWE
CWE-400

Uncontrolled Resource Consumption

CWE-1333

Inefficient Regular Expression Complexity