Rack is a modular Ruby web server interface. Carefully crafted content type headers can cause Rack’s media type parser to take much longer than expected, leading to a possible denial of service vulnerability (ReDos 2nd degree polynomial). This vulnerability is patched in 3.0.9.1 and 2.2.8.1.
References
Configurations
History
14 Feb 2025, 15:51
Type | Values Removed | Values Added |
---|---|---|
First Time |
Debian debian Linux
Rack Rack rack Debian |
|
CPE | cpe:2.3:a:rack:rack:*:*:*:*:*:ruby:*:* cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* |
|
References | () https://discuss.rubyonrails.org/t/denial-of-service-vulnerability-in-rack-content-type-parsing/84941 - Exploit, Vendor Advisory | |
References | () https://github.com/rack/rack/commit/6efb2ceea003c4b195815a614e00438cbd543462 - Patch | |
References | () https://github.com/rack/rack/commit/d9c163a443b8cadf4711d84bd2c58cb9ef89cf49 - Patch | |
References | () https://github.com/rack/rack/security/advisories/GHSA-22f2-v57c-j9cx - Exploit, Vendor Advisory | |
References | () https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2024-25126.yml - Exploit, Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2024/04/msg00022.html - Mailing List | |
References | () https://security.netapp.com/advisory/ntap-20240510-0005/ - Third Party Advisory |
21 Nov 2024, 09:00
Type | Values Removed | Values Added |
---|---|---|
References | () https://discuss.rubyonrails.org/t/denial-of-service-vulnerability-in-rack-content-type-parsing/84941 - | |
References | () https://github.com/rack/rack/commit/6efb2ceea003c4b195815a614e00438cbd543462 - | |
References | () https://github.com/rack/rack/commit/d9c163a443b8cadf4711d84bd2c58cb9ef89cf49 - | |
References | () https://github.com/rack/rack/security/advisories/GHSA-22f2-v57c-j9cx - | |
References | () https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2024-25126.yml - | |
References | () https://lists.debian.org/debian-lts-announce/2024/04/msg00022.html - | |
References | () https://security.netapp.com/advisory/ntap-20240510-0005/ - |
10 Jun 2024, 18:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
29 Apr 2024, 11:15
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
References |
|
29 Feb 2024, 00:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-02-29 00:15
Updated : 2025-02-14 15:51
NVD link : CVE-2024-25126
Mitre link : CVE-2024-25126
CVE.ORG link : CVE-2024-25126
JSON object : View
Products Affected
debian
- debian_linux
rack
- rack
CWE
CWE-1333
Inefficient Regular Expression Complexity