CVE-2024-26141

Rack is a modular Ruby web server interface. Carefully crafted Range headers can cause a server to respond with an unexpectedly large response. Responding with such large responses could lead to a denial of service issue. Vulnerable applications will use the `Rack::File` middleware or the `Rack::Utils.byte_ranges` methods (this includes Rails applications). The vulnerability is fixed in 3.0.9.1 and 2.2.8.1.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:rack:rack:*:*:*:*:*:ruby:*:*
cpe:2.3:a:rack:rack:*:*:*:*:*:ruby:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

History

14 Feb 2025, 15:33

Type Values Removed Values Added
CWE NVD-CWE-noinfo
First Time Debian debian Linux
Rack
Rack rack
Debian
CPE cpe:2.3:a:rack:rack:*:*:*:*:*:ruby:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
References () https://discuss.rubyonrails.org/t/possible-dos-vulnerability-with-range-header-in-rack/84944 - () https://discuss.rubyonrails.org/t/possible-dos-vulnerability-with-range-header-in-rack/84944 - Exploit, Vendor Advisory
References () https://github.com/rack/rack/commit/4849132bef471adb21131980df745f4bb84de2d9 - () https://github.com/rack/rack/commit/4849132bef471adb21131980df745f4bb84de2d9 - Patch
References () https://github.com/rack/rack/commit/62457686b26d33a15a254c7768c2076e8e02b48b - () https://github.com/rack/rack/commit/62457686b26d33a15a254c7768c2076e8e02b48b - Patch
References () https://github.com/rack/rack/security/advisories/GHSA-xj5v-6v4g-jfw6 - () https://github.com/rack/rack/security/advisories/GHSA-xj5v-6v4g-jfw6 - Vendor Advisory
References () https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2024-26141.yml - () https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2024-26141.yml - Exploit, Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2024/04/msg00022.html - () https://lists.debian.org/debian-lts-announce/2024/04/msg00022.html - Mailing List
References () https://security.netapp.com/advisory/ntap-20240510-0007/ - () https://security.netapp.com/advisory/ntap-20240510-0007/ - Third Party Advisory

21 Nov 2024, 09:02

Type Values Removed Values Added
References () https://discuss.rubyonrails.org/t/possible-dos-vulnerability-with-range-header-in-rack/84944 - () https://discuss.rubyonrails.org/t/possible-dos-vulnerability-with-range-header-in-rack/84944 -
References () https://github.com/rack/rack/commit/4849132bef471adb21131980df745f4bb84de2d9 - () https://github.com/rack/rack/commit/4849132bef471adb21131980df745f4bb84de2d9 -
References () https://github.com/rack/rack/commit/62457686b26d33a15a254c7768c2076e8e02b48b - () https://github.com/rack/rack/commit/62457686b26d33a15a254c7768c2076e8e02b48b -
References () https://github.com/rack/rack/security/advisories/GHSA-xj5v-6v4g-jfw6 - () https://github.com/rack/rack/security/advisories/GHSA-xj5v-6v4g-jfw6 -
References () https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2024-26141.yml - () https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2024-26141.yml -
References () https://lists.debian.org/debian-lts-announce/2024/04/msg00022.html - () https://lists.debian.org/debian-lts-announce/2024/04/msg00022.html -
References () https://security.netapp.com/advisory/ntap-20240510-0007/ - () https://security.netapp.com/advisory/ntap-20240510-0007/ -

10 Jun 2024, 17:16

Type Values Removed Values Added
References
  • () https://security.netapp.com/advisory/ntap-20240510-0007/ -

29 Apr 2024, 11:15

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/04/msg00022.html -
Summary
  • (es) Rack es una interfaz modular de servidor web Ruby. Los encabezados de rango cuidadosamente elaborados pueden hacer que un servidor responda con una respuesta inesperadamente grande. Responder con respuestas tan amplias podría dar lugar a un problema de denegación de servicio. Las aplicaciones vulnerables utilizarán el middleware `Rack::File` o los métodos `Rack::Utils.byte_ranges` (esto incluye aplicaciones Rails). La vulnerabilidad se solucionó en 3.0.9.1 y 2.2.8.1.

29 Feb 2024, 00:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-02-29 00:15

Updated : 2025-02-14 15:33


NVD link : CVE-2024-26141

Mitre link : CVE-2024-26141

CVE.ORG link : CVE-2024-26141


JSON object : View

Products Affected

debian

  • debian_linux

rack

  • rack
CWE
CWE-400

Uncontrolled Resource Consumption

NVD-CWE-noinfo