Skip to content

Commit 62b5607

Browse files
jasnowRubySec CI
authored and
RubySec CI
committed
Updated advisory posts against rubysec/ruby-advisory-db@606271d
1 parent 932ac3c commit 62b5607

File tree

1 file changed

+41
-0
lines changed

1 file changed

+41
-0
lines changed
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,41 @@
1+
---
2+
layout: advisory
3+
title: 'CVE-2024-39316 (rack): Rack ReDoS Vulnerability in HTTP Accept Headers Parsing'
4+
comments: false
5+
categories:
6+
- rack
7+
advisory:
8+
gem: rack
9+
cve: 2024-39316
10+
ghsa: cj83-2ww7-mvq7
11+
url: https://github.com/rack/rack/security/advisories/GHSA-cj83-2ww7-mvq7
12+
title: Rack ReDoS Vulnerability in HTTP Accept Headers Parsing
13+
date: 2024-07-03
14+
description: |
15+
### Summary
16+
17+
A Regular Expression Denial of Service (ReDoS) vulnerability exists
18+
in the `Rack::Request::Helpers` module when parsing HTTP Accept headers.
19+
This vulnerability can be exploited by an attacker sending specially
20+
crafted `Accept-Encoding` or `Accept-Language` headers, causing the
21+
server to spend excessive time processing the request and leading
22+
to a Denial of Service (DoS).
23+
24+
### Details
25+
26+
The fix for https://github.com/rack/rack/security/advisories/GHSA-54rr-7fvw-6x8f
27+
was not applied to the main branch and thus while the issue was fixed
28+
for the Rack v3.0 release series, it was not fixed in the v3.1
29+
release series until v3.1.5.
30+
cvss_v3: 6.5
31+
unaffected_versions:
32+
- "< 3.1.0"
33+
patched_versions:
34+
- ">= 3.1.5"
35+
related:
36+
url:
37+
- https://nvd.nist.gov/vuln/detail/CVE-2024-39316
38+
- https://github.com/rack/rack/security/advisories/GHSA-cj83-2ww7-mvq7
39+
- https://github.com/rack/rack/commit/412c980450ca729ee37f90a2661f166a9665e058
40+
- https://github.com/advisories/GHSA-cj83-2ww7-mvq7
41+
---

0 commit comments

Comments
 (0)