NA

CVE-2022-44571

Published: 09/02/2023 Updated: 08/12/2023
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 0

Vulnerability Summary

There is a denial of service vulnerability in the Content-Disposition parsingcomponent of Rack fixed in 2.0.9.2, 2.1.4.2, 2.2.4.1, 3.0.0.1. This could allow an malicious user to craft an input that can cause Content-Disposition header parsing in Rackto take an unexpected amount of time, possibly resulting in a denial ofservice attack vector. This header is used typically used in multipartparsing. Any applications that parse multipart posts using Rack (virtuallyall Rails applications) are impacted.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

rack project rack

Vendor Advisories

Debian Bug report logs - #1029832 ruby-rack: CVE-2022-44570 CVE-2022-44571 CVE-2022-44572 Package: src:ruby-rack; Maintainer for src:ruby-rack is Debian Ruby Team <pkg-ruby-extras-maintainers@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Sat, 28 Jan 2023 13:09:05 UTC Severity: ...
Several vulnerabilities were discovered in ruby-rack, a modular Ruby webserver interface, which may result in denial of service and shell escape sequence injection For the oldstable distribution (bullseye), these problems have been fixed in version 214-3+deb11u1 We recommend that you upgrade your ruby-rack packages For the detailed security st ...
Description<!----> This CVE is under investigation by Red Hat Product Security ...