CVE-2024-26141

Rack is a modular Ruby web server interface. Carefully crafted Range headers can cause a server to respond with an unexpectedly large response. Responding with such large responses could lead to a denial of service issue. Vulnerable applications will use the `Rack::File` middleware or the `Rack::Utils.byte_ranges` methods (this includes Rails applications). The vulnerability is fixed in 3.0.9.1 and 2.2.8.1.
Configurations

No configuration.

History

21 Nov 2024, 09:02

Type Values Removed Values Added
References () https://discuss.rubyonrails.org/t/possible-dos-vulnerability-with-range-header-in-rack/84944 - () https://discuss.rubyonrails.org/t/possible-dos-vulnerability-with-range-header-in-rack/84944 -
References () https://github.com/rack/rack/commit/4849132bef471adb21131980df745f4bb84de2d9 - () https://github.com/rack/rack/commit/4849132bef471adb21131980df745f4bb84de2d9 -
References () https://github.com/rack/rack/commit/62457686b26d33a15a254c7768c2076e8e02b48b - () https://github.com/rack/rack/commit/62457686b26d33a15a254c7768c2076e8e02b48b -
References () https://github.com/rack/rack/security/advisories/GHSA-xj5v-6v4g-jfw6 - () https://github.com/rack/rack/security/advisories/GHSA-xj5v-6v4g-jfw6 -
References () https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2024-26141.yml - () https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2024-26141.yml -
References () https://lists.debian.org/debian-lts-announce/2024/04/msg00022.html - () https://lists.debian.org/debian-lts-announce/2024/04/msg00022.html -
References () https://security.netapp.com/advisory/ntap-20240510-0007/ - () https://security.netapp.com/advisory/ntap-20240510-0007/ -

10 Jun 2024, 17:16

Type Values Removed Values Added
References
  • () https://security.netapp.com/advisory/ntap-20240510-0007/ -

29 Apr 2024, 11:15

Type Values Removed Values Added
Summary
  • (es) Rack es una interfaz modular de servidor web Ruby. Los encabezados de rango cuidadosamente elaborados pueden hacer que un servidor responda con una respuesta inesperadamente grande. Responder con respuestas tan amplias podría dar lugar a un problema de denegación de servicio. Las aplicaciones vulnerables utilizarán el middleware `Rack::File` o los métodos `Rack::Utils.byte_ranges` (esto incluye aplicaciones Rails). La vulnerabilidad se solucionó en 3.0.9.1 y 2.2.8.1.
References
  • () https://lists.debian.org/debian-lts-announce/2024/04/msg00022.html -

29 Feb 2024, 00:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-02-29 00:15

Updated : 2024-11-21 09:02


NVD link : CVE-2024-26141

Mitre link : CVE-2024-26141

CVE.ORG link : CVE-2024-26141


JSON object : View

Products Affected

No product.

CWE
CWE-400

Uncontrolled Resource Consumption