
We found results for “”
CVE-2024-25126
Good to know:

Date: February 28, 2024
Rack is a modular Ruby web server interface. Carefully crafted content type headers can cause Rack’s media type parser to take much longer than expected, leading to a possible denial of service vulnerability (ReDos 2nd degree polynomial). This vulnerability is patched in 3.0.9.1 and 2.2.8.1.
Language: Ruby
Severity Score
Related Resources (11)
Severity Score
Weakness Type (CWE)
Inefficient Regular Expression Complexity
CWE-1333Top Fix

Upgrade Version
Upgrade to version Rack - 1.1.1.pre;Rack - 2.0.0.alpha;Rack - 1.1.4;PactNet.OSX - no_fix;PactNet-Windows - no_fix;rack - 2.0.0;rack - 2.2.8.1;rack - 3.0.0.beta1;rack - 3.0.9.1;PactNet-Linux-x64 - no_fix;PactNet.Linux.x86 - no_fix;PactNet-Linux-x86 - no_fix;PactNet.Windows - no_fix;PactNet - 2.0.8-beta;PactNet.Linux.x64 - no_fix;logstash-binary - no_fix;PactNet-OSX - no_fix;files.com/files-php-sdk - v1.0.7
CVSS v3.1
Base Score: |
|
---|---|
Attack Vector (AV): | NETWORK |
Attack Complexity (AC): | LOW |
Privileges Required (PR): | NONE |
User Interaction (UI): | NONE |
Scope (S): | UNCHANGED |
Confidentiality (C): | NONE |
Integrity (I): | NONE |
Availability (A): | LOW |