Vulnerabilites related to rack_project - rack
CVE-2018-16470 (GCVE-0-2018-16470)
Vulnerability from cvelistv5
Published
2018-11-13 23:00
Modified
2024-08-05 10:24
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-400 - Denial of Service ()
Summary
There is a possible DoS vulnerability in the multipart parser in Rack before 2.0.6. Specially crafted requests can cause the multipart parser to enter a pathological state, causing the parser to use CPU resources disproportionate to the request size.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T10:24:32.612Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://groups.google.com/forum/#%21msg/rubyonrails-security/U_x-YkfuVTg/xhvYAmp6AAAJ" }, { "name": "RHSA-2019:3172", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:3172" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Rack", "vendor": "Rack", "versions": [ { "status": "affected", "version": "2.0.6" } ] } ], "datePublic": "2018-11-05T00:00:00", "descriptions": [ { "lang": "en", "value": "There is a possible DoS vulnerability in the multipart parser in Rack before 2.0.6. Specially crafted requests can cause the multipart parser to enter a pathological state, causing the parser to use CPU resources disproportionate to the request size." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-400", "description": "Denial of Service (CWE-400)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2019-10-24T22:06:22", "orgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "shortName": "hackerone" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://groups.google.com/forum/#%21msg/rubyonrails-security/U_x-YkfuVTg/xhvYAmp6AAAJ" }, { "name": "RHSA-2019:3172", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2019:3172" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "support@hackerone.com", "ID": "CVE-2018-16470", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Rack", "version": { "version_data": [ { "version_value": "2.0.6" } ] } } ] }, "vendor_name": "Rack" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a possible DoS vulnerability in the multipart parser in Rack before 2.0.6. Specially crafted requests can cause the multipart parser to enter a pathological state, causing the parser to use CPU resources disproportionate to the request size." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Denial of Service (CWE-400)" } ] } ] }, "references": { "reference_data": [ { "name": "https://groups.google.com/forum/#!msg/rubyonrails-security/U_x-YkfuVTg/xhvYAmp6AAAJ", "refsource": "MISC", "url": "https://groups.google.com/forum/#!msg/rubyonrails-security/U_x-YkfuVTg/xhvYAmp6AAAJ" }, { "name": "RHSA-2019:3172", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:3172" } ] } } } }, "cveMetadata": { "assignerOrgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "assignerShortName": "hackerone", "cveId": "CVE-2018-16470", "datePublished": "2018-11-13T23:00:00", "dateReserved": "2018-09-04T00:00:00", "dateUpdated": "2024-08-05T10:24:32.612Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-30122 (GCVE-0-2022-30122)
Vulnerability from cvelistv5
Published
2022-12-05 00:00
Modified
2024-11-19 20:16
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-400 - Denial of Service ()
Summary
A possible denial of service vulnerability exists in Rack <2.0.9.1, <2.1.4.1 and <2.2.3.1 in the multipart parsing component of Rack.
References
► | URL | Tags |
---|---|---|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | https://github.com/rack/rack |
Version: 2.0.9.1, 2.1.4.1, 2.2.3.1 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T06:40:47.618Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://discuss.rubyonrails.org/t/cve-2022-30122-denial-of-service-vulnerability-in-rack-multipart-parsing/80729" }, { "name": "DSA-5530", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.debian.org/security/2023/dsa-5530" }, { "name": "GLSA-202310-18", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202310-18" }, { "tags": [ "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20231208-0012/" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-30122", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2023-12-13T16:09:46.798688Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-19T20:16:22.716Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "https://github.com/rack/rack", "vendor": "n/a", "versions": [ { "status": "affected", "version": "2.0.9.1, 2.1.4.1, 2.2.3.1" } ] } ], "descriptions": [ { "lang": "en", "value": "A possible denial of service vulnerability exists in Rack \u003c2.0.9.1, \u003c2.1.4.1 and \u003c2.2.3.1 in the multipart parsing component of Rack." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-400", "description": "Denial of Service (CWE-400)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-12-08T22:06:21.756956", "orgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "shortName": "hackerone" }, "references": [ { "url": "https://discuss.rubyonrails.org/t/cve-2022-30122-denial-of-service-vulnerability-in-rack-multipart-parsing/80729" }, { "name": "DSA-5530", "tags": [ "vendor-advisory" ], "url": "https://www.debian.org/security/2023/dsa-5530" }, { "name": "GLSA-202310-18", "tags": [ "vendor-advisory" ], "url": "https://security.gentoo.org/glsa/202310-18" }, { "url": "https://security.netapp.com/advisory/ntap-20231208-0012/" } ] } }, "cveMetadata": { "assignerOrgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "assignerShortName": "hackerone", "cveId": "CVE-2022-30122", "datePublished": "2022-12-05T00:00:00", "dateReserved": "2022-05-02T00:00:00", "dateUpdated": "2024-11-19T20:16:22.716Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2013-0183 (GCVE-0-2013-0183)
Vulnerability from cvelistv5
Published
2013-03-01 02:00
Modified
2024-08-06 14:18
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
multipart/parser.rb in Rack 1.3.x before 1.3.8 and 1.4.x before 1.4.3 allows remote attackers to cause a denial of service (memory consumption and out-of-memory error) via a long string in a Multipart HTTP packet.
References
► | URL | Tags | ||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T14:18:09.430Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/rack/rack/commit/548b9af2dc0059f4c0c19728624448d84de450ff" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=895282" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://rack.github.com/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://groups.google.com/forum/#%21topic/rack-devel/-MWPHDeGWtI" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://groups.google.com/forum/#%21topic/rack-devel/7ZKPNAjgRSs" }, { "name": "openSUSE-SU-2013:0462", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-03/msg00048.html" }, { "name": "RHSA-2013:0548", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-0548.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/rack/rack/commit/f95113402b7239f225282806673e1b6424522b18" }, { "name": "RHSA-2013:0544", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-0544.html" }, { "name": "DSA-2783", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2013/dsa-2783" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-08-22T00:00:00", "descriptions": [ { "lang": "en", "value": "multipart/parser.rb in Rack 1.3.x before 1.3.8 and 1.4.x before 1.4.3 allows remote attackers to cause a denial of service (memory consumption and out-of-memory error) via a long string in a Multipart HTTP packet." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-05-15T09:00:00", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/rack/rack/commit/548b9af2dc0059f4c0c19728624448d84de450ff" }, { "tags": [ "x_refsource_MISC" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=895282" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://rack.github.com/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://groups.google.com/forum/#%21topic/rack-devel/-MWPHDeGWtI" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://groups.google.com/forum/#%21topic/rack-devel/7ZKPNAjgRSs" }, { "name": "openSUSE-SU-2013:0462", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-03/msg00048.html" }, { "name": "RHSA-2013:0548", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-0548.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/rack/rack/commit/f95113402b7239f225282806673e1b6424522b18" }, { "name": "RHSA-2013:0544", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-0544.html" }, { "name": "DSA-2783", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2013/dsa-2783" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2013-0183", "datePublished": "2013-03-01T02:00:00", "dateReserved": "2012-12-06T00:00:00", "dateUpdated": "2024-08-06T14:18:09.430Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2015-3225 (GCVE-0-2015-3225)
Vulnerability from cvelistv5
Published
2015-07-26 22:00
Modified
2024-08-06 05:39
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
lib/rack/utils.rb in Rack before 1.5.4 and 1.6.x before 1.6.2, as used with Ruby on Rails 3.x and 4.x and other products, allows remote attackers to cause a denial of service (SystemStackError) via a request with a large parameter depth.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T05:39:32.007Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "openSUSE-SU-2015:1262", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2015-07/msg00043.html" }, { "name": "openSUSE-SU-2015:1263", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2015-07/msg00044.html" }, { "name": "RHSA-2015:2290", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-2290.html" }, { "name": "FEDORA-2015-12979", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-August/165180.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/rack/rack/blob/master/HISTORY.md" }, { "name": "[rubyonrails-security] 20150616 [CVE-2015-3225] Potential Denial of Service Vulnerability in Rack", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://groups.google.com/forum/message/raw?msg=rubyonrails-security/gcUbICUmKMc/qiCotVZwXrMJ" }, { "name": "DSA-3322", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2015/dsa-3322" }, { "name": "openSUSE-SU-2015:1259", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2015-07/msg00040.html" }, { "name": "75232", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/75232" }, { "name": "FEDORA-2015-12978", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-August/164173.html" }, { "name": "[oss-security] 20150616 [CVE-2015-3225] Potential Denial of Service Vulnerability in Rack", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://openwall.com/lists/oss-security/2015/06/16/14" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-06-16T00:00:00", "descriptions": [ { "lang": "en", "value": "lib/rack/utils.rb in Rack before 1.5.4 and 1.6.x before 1.6.2, as used with Ruby on Rails 3.x and 4.x and other products, allows remote attackers to cause a denial of service (SystemStackError) via a request with a large parameter depth." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-12-22T18:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "openSUSE-SU-2015:1262", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2015-07/msg00043.html" }, { "name": "openSUSE-SU-2015:1263", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2015-07/msg00044.html" }, { "name": "RHSA-2015:2290", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-2290.html" }, { "name": "FEDORA-2015-12979", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-August/165180.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/rack/rack/blob/master/HISTORY.md" }, { "name": "[rubyonrails-security] 20150616 [CVE-2015-3225] Potential Denial of Service Vulnerability in Rack", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://groups.google.com/forum/message/raw?msg=rubyonrails-security/gcUbICUmKMc/qiCotVZwXrMJ" }, { "name": "DSA-3322", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2015/dsa-3322" }, { "name": "openSUSE-SU-2015:1259", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2015-07/msg00040.html" }, { "name": "75232", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/75232" }, { "name": "FEDORA-2015-12978", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-August/164173.html" }, { "name": "[oss-security] 20150616 [CVE-2015-3225] Potential Denial of Service Vulnerability in Rack", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://openwall.com/lists/oss-security/2015/06/16/14" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2015-3225", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "lib/rack/utils.rb in Rack before 1.5.4 and 1.6.x before 1.6.2, as used with Ruby on Rails 3.x and 4.x and other products, allows remote attackers to cause a denial of service (SystemStackError) via a request with a large parameter depth." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "openSUSE-SU-2015:1262", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2015-07/msg00043.html" }, { "name": "openSUSE-SU-2015:1263", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2015-07/msg00044.html" }, { "name": "RHSA-2015:2290", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2015-2290.html" }, { "name": "FEDORA-2015-12979", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-August/165180.html" }, { "name": "https://github.com/rack/rack/blob/master/HISTORY.md", "refsource": "CONFIRM", "url": "https://github.com/rack/rack/blob/master/HISTORY.md" }, { "name": "[rubyonrails-security] 20150616 [CVE-2015-3225] Potential Denial of Service Vulnerability in Rack", "refsource": "MLIST", "url": "https://groups.google.com/forum/message/raw?msg=rubyonrails-security/gcUbICUmKMc/qiCotVZwXrMJ" }, { "name": "DSA-3322", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2015/dsa-3322" }, { "name": "openSUSE-SU-2015:1259", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2015-07/msg00040.html" }, { "name": "75232", "refsource": "BID", "url": "http://www.securityfocus.com/bid/75232" }, { "name": "FEDORA-2015-12978", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-August/164173.html" }, { "name": "[oss-security] 20150616 [CVE-2015-3225] Potential Denial of Service Vulnerability in Rack", "refsource": "MLIST", "url": "http://openwall.com/lists/oss-security/2015/06/16/14" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2015-3225", "datePublished": "2015-07-26T22:00:00", "dateReserved": "2015-04-10T00:00:00", "dateUpdated": "2024-08-06T05:39:32.007Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2011-5036 (GCVE-0-2011-5036)
Vulnerability from cvelistv5
Published
2011-12-30 01:00
Modified
2024-08-07 00:23
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Rack before 1.1.3, 1.2.x before 1.2.5, and 1.3.x before 1.3.6 computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters.
References
► | URL | Tags | ||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T00:23:39.882Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.nruns.com/_downloads/advisory28122011.pdf" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://gist.github.com/52bbc6b9cc19ce330829" }, { "name": "VU#903934", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/903934" }, { "name": "20111228 n.runs-SA-2011.004 - web programming languages and platforms - DoS through hash table", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2011-12/0181.html" }, { "name": "DSA-2783", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2013/dsa-2783" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.ocert.org/advisories/ocert-2011-003.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-12-28T00:00:00", "descriptions": [ { "lang": "en", "value": "Rack before 1.1.3, 1.2.x before 1.2.5, and 1.3.x before 1.3.6 computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2012-11-06T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://www.nruns.com/_downloads/advisory28122011.pdf" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://gist.github.com/52bbc6b9cc19ce330829" }, { "name": "VU#903934", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/903934" }, { "name": "20111228 n.runs-SA-2011.004 - web programming languages and platforms - DoS through hash table", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2011-12/0181.html" }, { "name": "DSA-2783", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2013/dsa-2783" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.ocert.org/advisories/ocert-2011-003.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2011-5036", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Rack before 1.1.3, 1.2.x before 1.2.5, and 1.3.x before 1.3.6 computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.nruns.com/_downloads/advisory28122011.pdf", "refsource": "MISC", "url": "http://www.nruns.com/_downloads/advisory28122011.pdf" }, { "name": "https://gist.github.com/52bbc6b9cc19ce330829", "refsource": "CONFIRM", "url": "https://gist.github.com/52bbc6b9cc19ce330829" }, { "name": "VU#903934", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/903934" }, { "name": "20111228 n.runs-SA-2011.004 - web programming languages and platforms - DoS through hash table", "refsource": "BUGTRAQ", "url": "http://archives.neohapsis.com/archives/bugtraq/2011-12/0181.html" }, { "name": "DSA-2783", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2013/dsa-2783" }, { "name": "http://www.ocert.org/advisories/ocert-2011-003.html", "refsource": "MISC", "url": "http://www.ocert.org/advisories/ocert-2011-003.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2011-5036", "datePublished": "2011-12-30T01:00:00", "dateReserved": "2011-12-29T00:00:00", "dateUpdated": "2024-08-07T00:23:39.882Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2018-16471 (GCVE-0-2018-16471)
Vulnerability from cvelistv5
Published
2018-11-13 23:00
Modified
2024-08-05 10:24
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-79 - Cross-site Scripting (XSS) - Stored ()
Summary
There is a possible XSS vulnerability in Rack before 2.0.6 and 1.6.11. Carefully crafted requests can impact the data returned by the `scheme` method on `Rack::Request`. Applications that expect the scheme to be limited to 'http' or 'https' and do not escape the return value could be vulnerable to an XSS attack. Note that applications using the normal escaping mechanisms provided by Rails may not impacted, but applications that bypass the escaping mechanisms, or do not use them may be vulnerable.
References
► | URL | Tags | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T10:24:32.587Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://groups.google.com/forum/#%21topic/rubyonrails-security/GKsAFT924Ag" }, { "name": "[debian-lts-announce] 20181121 [SECURITY] [DLA 1585-1] ruby-rack security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2018/11/msg00022.html" }, { "name": "openSUSE-SU-2019:1553", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00032.html" }, { "name": "USN-4089-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/4089-1/" }, { "name": "openSUSE-SU-2020:0214", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00016.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Rack", "vendor": "Rack", "versions": [ { "status": "affected", "version": "2.0.6, 1.6.11" } ] } ], "datePublic": "2018-11-05T00:00:00", "descriptions": [ { "lang": "en", "value": "There is a possible XSS vulnerability in Rack before 2.0.6 and 1.6.11. Carefully crafted requests can impact the data returned by the `scheme` method on `Rack::Request`. Applications that expect the scheme to be limited to \u0027http\u0027 or \u0027https\u0027 and do not escape the return value could be vulnerable to an XSS attack. Note that applications using the normal escaping mechanisms provided by Rails may not impacted, but applications that bypass the escaping mechanisms, or do not use them may be vulnerable." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "Cross-site Scripting (XSS) - Stored (CWE-79)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-02-12T21:06:06", "orgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "shortName": "hackerone" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://groups.google.com/forum/#%21topic/rubyonrails-security/GKsAFT924Ag" }, { "name": "[debian-lts-announce] 20181121 [SECURITY] [DLA 1585-1] ruby-rack security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2018/11/msg00022.html" }, { "name": "openSUSE-SU-2019:1553", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00032.html" }, { "name": "USN-4089-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/4089-1/" }, { "name": "openSUSE-SU-2020:0214", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00016.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "support@hackerone.com", "ID": "CVE-2018-16471", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Rack", "version": { "version_data": [ { "version_value": "2.0.6, 1.6.11" } ] } } ] }, "vendor_name": "Rack" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a possible XSS vulnerability in Rack before 2.0.6 and 1.6.11. Carefully crafted requests can impact the data returned by the `scheme` method on `Rack::Request`. Applications that expect the scheme to be limited to \u0027http\u0027 or \u0027https\u0027 and do not escape the return value could be vulnerable to an XSS attack. Note that applications using the normal escaping mechanisms provided by Rails may not impacted, but applications that bypass the escaping mechanisms, or do not use them may be vulnerable." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Cross-site Scripting (XSS) - Stored (CWE-79)" } ] } ] }, "references": { "reference_data": [ { "name": "https://groups.google.com/forum/#!topic/rubyonrails-security/GKsAFT924Ag", "refsource": "MISC", "url": "https://groups.google.com/forum/#!topic/rubyonrails-security/GKsAFT924Ag" }, { "name": "[debian-lts-announce] 20181121 [SECURITY] [DLA 1585-1] ruby-rack security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2018/11/msg00022.html" }, { "name": "openSUSE-SU-2019:1553", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00032.html" }, { "name": "USN-4089-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4089-1/" }, { "name": "openSUSE-SU-2020:0214", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00016.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "assignerShortName": "hackerone", "cveId": "CVE-2018-16471", "datePublished": "2018-11-13T23:00:00", "dateReserved": "2018-09-04T00:00:00", "dateUpdated": "2024-08-05T10:24:32.587Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2013-0262 (GCVE-0-2013-0262)
Vulnerability from cvelistv5
Published
2013-02-08 20:00
Modified
2024-08-06 14:18
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
rack/file.rb (Rack::File) in Rack 1.5.x before 1.5.2 and 1.4.x before 1.4.5 allows attackers to access arbitrary files outside the intended root directory via a crafted PATH_INFO environment variable, probably a directory traversal vulnerability that is remotely exploitable, aka "symlink path traversals."
References
► | URL | Tags | ||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T14:18:09.610Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://groups.google.com/forum/#%21msg/rack-devel/mZsuRonD7G8/DpZIOmMLbOgJ" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://gist.github.com/rentzsch/4736940" }, { "name": "52033", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/52033" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://rack.github.com/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=909071" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://groups.google.com/forum/#%21msg/rack-devel/bf937jPZxJM/1s6x95vIhmAJ" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/rack/rack/commit/6f237e4c9fab649d3750482514f0fde76c56ab30" }, { "name": "openSUSE-SU-2013:0462", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-03/msg00048.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/rack/rack/blob/master/lib/rack/file.rb#L56" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=909072" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-02-07T00:00:00", "descriptions": [ { "lang": "en", "value": "rack/file.rb (Rack::File) in Rack 1.5.x before 1.5.2 and 1.4.x before 1.4.5 allows attackers to access arbitrary files outside the intended root directory via a crafted PATH_INFO environment variable, probably a directory traversal vulnerability that is remotely exploitable, aka \"symlink path traversals.\"" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-05-15T09:00:00", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://groups.google.com/forum/#%21msg/rack-devel/mZsuRonD7G8/DpZIOmMLbOgJ" }, { "tags": [ "x_refsource_MISC" ], "url": "https://gist.github.com/rentzsch/4736940" }, { "name": "52033", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/52033" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://rack.github.com/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=909071" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://groups.google.com/forum/#%21msg/rack-devel/bf937jPZxJM/1s6x95vIhmAJ" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/rack/rack/commit/6f237e4c9fab649d3750482514f0fde76c56ab30" }, { "name": "openSUSE-SU-2013:0462", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-03/msg00048.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/rack/rack/blob/master/lib/rack/file.rb#L56" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=909072" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2013-0262", "datePublished": "2013-02-08T20:00:00", "dateReserved": "2012-12-06T00:00:00", "dateUpdated": "2024-08-06T14:18:09.610Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2013-0184 (GCVE-0-2013-0184)
Vulnerability from cvelistv5
Published
2013-03-01 02:00
Modified
2024-08-06 14:18
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Unspecified vulnerability in Rack::Auth::AbstractRequest in Rack 1.1.x before 1.1.5, 1.2.x before 1.2.7, 1.3.x before 1.3.9, and 1.4.x before 1.4.4 allows remote attackers to cause a denial of service via unknown vectors related to "symbolized arbitrary strings."
References
► | URL | Tags | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T14:18:08.932Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=895384" }, { "name": "openSUSE-SU-2013:0462", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-03/msg00048.html" }, { "name": "RHSA-2013:0548", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-0548.html" }, { "name": "RHSA-2013:0544", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-0544.html" }, { "name": "DSA-2783", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2013/dsa-2783" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-01-13T00:00:00", "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in Rack::Auth::AbstractRequest in Rack 1.1.x before 1.1.5, 1.2.x before 1.2.7, 1.3.x before 1.3.9, and 1.4.x before 1.4.4 allows remote attackers to cause a denial of service via unknown vectors related to \"symbolized arbitrary strings.\"" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-05-15T09:00:00", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=895384" }, { "name": "openSUSE-SU-2013:0462", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-03/msg00048.html" }, { "name": "RHSA-2013:0548", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-0548.html" }, { "name": "RHSA-2013:0544", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-0544.html" }, { "name": "DSA-2783", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2013/dsa-2783" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2013-0184", "datePublished": "2013-03-01T02:00:00", "dateReserved": "2012-12-06T00:00:00", "dateUpdated": "2024-08-06T14:18:08.932Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2013-0263 (GCVE-0-2013-0263)
Vulnerability from cvelistv5
Published
2013-02-08 20:00
Modified
2024-08-06 14:18
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Rack::Session::Cookie in Rack 1.5.x before 1.5.2, 1.4.x before 1.4.5, 1.3.x before 1.3.10, 1.2.x before 1.2.8, and 1.1.x before 1.1.6 allows remote attackers to guess the session cookie, gain privileges, and execute arbitrary code via a timing attack involving an HMAC comparison function that does not run in constant time.
References
► | URL | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T14:18:09.586Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "52774", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/52774" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://groups.google.com/forum/#%21msg/rack-devel/mZsuRonD7G8/DpZIOmMLbOgJ" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://groups.google.com/forum/#%21msg/rack-devel/RnQxm6i13C4/xfakH81yWvgJ" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/rack/rack/commit/9a81b961457805f6d1a5c275d053068440421e11" }, { "name": "52033", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/52033" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/rack/rack/commit/0cd7e9aa397f8ebb3b8481d67dbac8b4863a7f07" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://rack.github.com/" }, { "name": "52134", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/52134" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://groups.google.com/d/msg/rack-devel/xKrHVWeNvDM/4ZGA576CnK4J" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=909071" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://groups.google.com/forum/#%21msg/rack-devel/hz-liLb9fKE/8jvVWU6xYiYJ" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://groups.google.com/forum/#%21msg/rack-devel/bf937jPZxJM/1s6x95vIhmAJ" }, { "name": "RHSA-2013:0686", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-0686.html" }, { "name": "openSUSE-SU-2013:0462", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-03/msg00048.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://puppet.com/security/cve/cve-2013-0263" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://gist.github.com/codahale/f9f3781f7b54985bee94" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://twitter.com/coda/statuses/299732877745197056" }, { "name": "89939", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/89939" }, { "name": "DSA-2783", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2013/dsa-2783" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-02-07T00:00:00", "descriptions": [ { "lang": "en", "value": "Rack::Session::Cookie in Rack 1.5.x before 1.5.2, 1.4.x before 1.4.5, 1.3.x before 1.3.10, 1.2.x before 1.2.8, and 1.1.x before 1.1.6 allows remote attackers to guess the session cookie, gain privileges, and execute arbitrary code via a timing attack involving an HMAC comparison function that does not run in constant time." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-12-08T10:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "52774", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/52774" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://groups.google.com/forum/#%21msg/rack-devel/mZsuRonD7G8/DpZIOmMLbOgJ" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://groups.google.com/forum/#%21msg/rack-devel/RnQxm6i13C4/xfakH81yWvgJ" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/rack/rack/commit/9a81b961457805f6d1a5c275d053068440421e11" }, { "name": "52033", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/52033" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/rack/rack/commit/0cd7e9aa397f8ebb3b8481d67dbac8b4863a7f07" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://rack.github.com/" }, { "name": "52134", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/52134" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://groups.google.com/d/msg/rack-devel/xKrHVWeNvDM/4ZGA576CnK4J" }, { "tags": [ "x_refsource_MISC" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=909071" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://groups.google.com/forum/#%21msg/rack-devel/hz-liLb9fKE/8jvVWU6xYiYJ" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://groups.google.com/forum/#%21msg/rack-devel/bf937jPZxJM/1s6x95vIhmAJ" }, { "name": "RHSA-2013:0686", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-0686.html" }, { "name": "openSUSE-SU-2013:0462", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-03/msg00048.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://puppet.com/security/cve/cve-2013-0263" }, { "tags": [ "x_refsource_MISC" ], "url": "https://gist.github.com/codahale/f9f3781f7b54985bee94" }, { "tags": [ "x_refsource_MISC" ], "url": "https://twitter.com/coda/statuses/299732877745197056" }, { "name": "89939", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/89939" }, { "name": "DSA-2783", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2013/dsa-2783" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2013-0263", "datePublished": "2013-02-08T20:00:00", "dateReserved": "2012-12-06T00:00:00", "dateUpdated": "2024-08-06T14:18:09.586Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-30123 (GCVE-0-2022-30123)
Vulnerability from cvelistv5
Published
2022-12-05 00:00
Modified
2024-08-03 06:40
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-150 - Improper Neutralization of Escape, Meta, or Control Sequences ()
Summary
A sequence injection vulnerability exists in Rack <2.0.9.1, <2.1.4.1 and <2.2.3.1 which could allow is a possible shell escape in the Lint and CommonLogger components of Rack.
References
► | URL | Tags |
---|---|---|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | https://github.com/rack/rack |
Version: 2.0.9.1, 2.1.4.1, 2.2.3.1 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T06:40:47.582Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://discuss.rubyonrails.org/t/cve-2022-30123-possible-shell-escape-sequence-injection-vulnerability-in-rack/80728" }, { "name": "DSA-5530", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.debian.org/security/2023/dsa-5530" }, { "name": "GLSA-202310-18", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202310-18" }, { "tags": [ "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20231208-0011/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "https://github.com/rack/rack", "vendor": "n/a", "versions": [ { "status": "affected", "version": "2.0.9.1, 2.1.4.1, 2.2.3.1" } ] } ], "descriptions": [ { "lang": "en", "value": "A sequence injection vulnerability exists in Rack \u003c2.0.9.1, \u003c2.1.4.1 and \u003c2.2.3.1 which could allow is a possible shell escape in the Lint and CommonLogger components of Rack." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-150", "description": "Improper Neutralization of Escape, Meta, or Control Sequences (CWE-150)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-12-08T22:06:15.677017", "orgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "shortName": "hackerone" }, "references": [ { "url": "https://discuss.rubyonrails.org/t/cve-2022-30123-possible-shell-escape-sequence-injection-vulnerability-in-rack/80728" }, { "name": "DSA-5530", "tags": [ "vendor-advisory" ], "url": "https://www.debian.org/security/2023/dsa-5530" }, { "name": "GLSA-202310-18", "tags": [ "vendor-advisory" ], "url": "https://security.gentoo.org/glsa/202310-18" }, { "url": "https://security.netapp.com/advisory/ntap-20231208-0011/" } ] } }, "cveMetadata": { "assignerOrgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "assignerShortName": "hackerone", "cveId": "CVE-2022-30123", "datePublished": "2022-12-05T00:00:00", "dateReserved": "2022-05-02T00:00:00", "dateUpdated": "2024-08-03T06:40:47.582Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-8184 (GCVE-0-2020-8184)
Vulnerability from cvelistv5
Published
2020-06-19 00:00
Modified
2024-08-04 09:56
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-784 - Reliance on Cookies without Validation and Integrity Checking in a Security Decision ()
Summary
A reliance on cookies without validation/integrity check security vulnerability exists in rack < 2.2.3, rack < 2.1.4 that makes it is possible for an attacker to forge a secure or host-only cookie prefix.
References
► | URL | Tags | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | https://github.com/rack/rack |
Version: rack >= 2.2.3, rack >= 2.1.4 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T09:56:26.918Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://hackerone.com/reports/895727" }, { "tags": [ "x_transferred" ], "url": "https://groups.google.com/g/rubyonrails-security/c/OWtmozPH9Ak" }, { "name": "[debian-lts-announce] 20200710 [SECURITY] [DLA 2275-1] ruby-rack security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2020/07/msg00006.html" }, { "name": "USN-4561-1", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://usn.ubuntu.com/4561-1/" }, { "name": "[debian-lts-announce] 20230130 [SECURITY] [DLA 3298-1] ruby-rack security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2023/01/msg00038.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "https://github.com/rack/rack", "vendor": "n/a", "versions": [ { "status": "affected", "version": "rack \u003e= 2.2.3, rack \u003e= 2.1.4" } ] } ], "descriptions": [ { "lang": "en", "value": "A reliance on cookies without validation/integrity check security vulnerability exists in rack \u003c 2.2.3, rack \u003c 2.1.4 that makes it is possible for an attacker to forge a secure or host-only cookie prefix." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-784", "description": "Reliance on Cookies without Validation and Integrity Checking in a Security Decision (CWE-784)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-01-31T00:00:00", "orgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "shortName": "hackerone" }, "references": [ { "url": "https://hackerone.com/reports/895727" }, { "url": "https://groups.google.com/g/rubyonrails-security/c/OWtmozPH9Ak" }, { "name": "[debian-lts-announce] 20200710 [SECURITY] [DLA 2275-1] ruby-rack security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2020/07/msg00006.html" }, { "name": "USN-4561-1", "tags": [ "vendor-advisory" ], "url": "https://usn.ubuntu.com/4561-1/" }, { "name": "[debian-lts-announce] 20230130 [SECURITY] [DLA 3298-1] ruby-rack security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2023/01/msg00038.html" } ] } }, "cveMetadata": { "assignerOrgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "assignerShortName": "hackerone", "cveId": "CVE-2020-8184", "datePublished": "2020-06-19T00:00:00", "dateReserved": "2020-01-28T00:00:00", "dateUpdated": "2024-08-04T09:56:26.918Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-8161 (GCVE-0-2020-8161)
Vulnerability from cvelistv5
Published
2020-07-02 00:00
Modified
2024-08-04 09:48
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-548 - Information Exposure Through Directory Listing ()
Summary
A directory traversal vulnerability exists in rack < 2.2.0 that allows an attacker perform directory traversal vulnerability in the Rack::Directory app that is bundled with Rack which could result in information disclosure.
References
► | URL | Tags | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | https://github.com/rack/rack |
Version: Fixed in 2.1.3, >= 2.2.0 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T09:48:25.656Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://hackerone.com/reports/434404" }, { "tags": [ "x_transferred" ], "url": "https://groups.google.com/g/rubyonrails-security/c/IOO1vNZTzPA" }, { "name": "[debian-lts-announce] 20200710 [SECURITY] [DLA 2275-1] ruby-rack security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2020/07/msg00006.html" }, { "name": "USN-4561-1", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://usn.ubuntu.com/4561-1/" }, { "name": "[debian-lts-announce] 20230130 [SECURITY] [DLA 3298-1] ruby-rack security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2023/01/msg00038.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "https://github.com/rack/rack", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Fixed in 2.1.3, \u003e= 2.2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "A directory traversal vulnerability exists in rack \u003c 2.2.0 that allows an attacker perform directory traversal vulnerability in the Rack::Directory app that is bundled with Rack which could result in information disclosure." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-548", "description": "Information Exposure Through Directory Listing (CWE-548)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-01-31T00:00:00", "orgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "shortName": "hackerone" }, "references": [ { "url": "https://hackerone.com/reports/434404" }, { "url": "https://groups.google.com/g/rubyonrails-security/c/IOO1vNZTzPA" }, { "name": "[debian-lts-announce] 20200710 [SECURITY] [DLA 2275-1] ruby-rack security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2020/07/msg00006.html" }, { "name": "USN-4561-1", "tags": [ "vendor-advisory" ], "url": "https://usn.ubuntu.com/4561-1/" }, { "name": "[debian-lts-announce] 20230130 [SECURITY] [DLA 3298-1] ruby-rack security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2023/01/msg00038.html" } ] } }, "cveMetadata": { "assignerOrgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "assignerShortName": "hackerone", "cveId": "CVE-2020-8161", "datePublished": "2020-07-02T00:00:00", "dateReserved": "2020-01-28T00:00:00", "dateUpdated": "2024-08-04T09:48:25.656Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2012-6109 (GCVE-0-2012-6109)
Vulnerability from cvelistv5
Published
2013-03-01 02:00
Modified
2024-08-06 21:28
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
lib/rack/multipart.rb in Rack before 1.1.4, 1.2.x before 1.2.6, 1.3.x before 1.3.7, and 1.4.x before 1.4.2 uses an incorrect regular expression, which allows remote attackers to cause a denial of service (infinite loop) via a crafted Content-Disposion header.
References
► | URL | Tags | |||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T21:28:39.300Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=895277" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/rack/rack/commit/c9f65df37a151821eb88ddd1dc404b83e52c52d5" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://rack.github.com/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/rack/rack/blob/master/README.rdoc" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://groups.google.com/forum/#%21msg/rack-devel/1w4_fWEgTdI/XAkSNHjtdTsJ" }, { "name": "RHSA-2013:0548", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-0548.html" }, { "name": "RHSA-2013:0544", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-0544.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "lib/rack/multipart.rb in Rack before 1.1.4, 1.2.x before 1.2.6, 1.3.x before 1.3.7, and 1.4.x before 1.4.2 uses an incorrect regular expression, which allows remote attackers to cause a denial of service (infinite loop) via a crafted Content-Disposion header." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-03-01T02:00:00Z", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=895277" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/rack/rack/commit/c9f65df37a151821eb88ddd1dc404b83e52c52d5" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://rack.github.com/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/rack/rack/blob/master/README.rdoc" }, { "tags": [ "x_refsource_MISC" ], "url": "https://groups.google.com/forum/#%21msg/rack-devel/1w4_fWEgTdI/XAkSNHjtdTsJ" }, { "name": "RHSA-2013:0548", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-0548.html" }, { "name": "RHSA-2013:0544", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-0544.html" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2012-6109", "datePublished": "2013-03-01T02:00:00Z", "dateReserved": "2012-12-06T00:00:00Z", "dateUpdated": "2024-08-06T21:28:39.300Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2020-06-19 17:15
Modified
2024-11-21 05:38
Severity ?
Summary
A reliance on cookies without validation/integrity check security vulnerability exists in rack < 2.2.3, rack < 2.1.4 that makes it is possible for an attacker to forge a secure or host-only cookie prefix.
References
▶ | URL | Tags | |
---|---|---|---|
support@hackerone.com | https://groups.google.com/g/rubyonrails-security/c/OWtmozPH9Ak | Mailing List, Patch, Third Party Advisory | |
support@hackerone.com | https://hackerone.com/reports/895727 | Exploit, Patch, Third Party Advisory | |
support@hackerone.com | https://lists.debian.org/debian-lts-announce/2020/07/msg00006.html | Mailing List, Third Party Advisory | |
support@hackerone.com | https://lists.debian.org/debian-lts-announce/2023/01/msg00038.html | Mailing List, Third Party Advisory | |
support@hackerone.com | https://usn.ubuntu.com/4561-1/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://groups.google.com/g/rubyonrails-security/c/OWtmozPH9Ak | Mailing List, Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://hackerone.com/reports/895727 | Exploit, Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2020/07/msg00006.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2023/01/msg00038.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/4561-1/ | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
rack_project | rack | * | |
rack_project | rack | * | |
debian | debian_linux | 9.0 | |
debian | debian_linux | 10.0 | |
canonical | ubuntu_linux | 18.04 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rack_project:rack:*:*:*:*:*:*:*:*", "matchCriteriaId": "9A2DAF3B-ED2C-45BC-A171-90CDF9FAFB5F", "versionEndExcluding": "2.1.4", "vulnerable": true }, { "criteria": "cpe:2.3:a:rack_project:rack:*:*:*:*:*:*:*:*", "matchCriteriaId": "AEF24106-652B-4267-A9C1-16B2C4182031", "versionEndExcluding": "2.2.3", "versionStartIncluding": "2.2.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A reliance on cookies without validation/integrity check security vulnerability exists in rack \u003c 2.2.3, rack \u003c 2.1.4 that makes it is possible for an attacker to forge a secure or host-only cookie prefix." }, { "lang": "es", "value": "Se presenta una dependencia de las cookies sin vulnerabilidad de seguridad de control de validaci\u00f3n e integridad en rack versiones anteriores a 2.2.3, rack versiones anteriores a 2.1.4, que hace posible a un atacante forjar un prefijo de cookie seguro o solo de host" } ], "id": "CVE-2020-8184", "lastModified": "2024-11-21T05:38:27.507", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-06-19T17:15:18.757", "references": [ { "source": "support@hackerone.com", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ], "url": "https://groups.google.com/g/rubyonrails-security/c/OWtmozPH9Ak" }, { "source": "support@hackerone.com", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://hackerone.com/reports/895727" }, { "source": "support@hackerone.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/07/msg00006.html" }, { "source": "support@hackerone.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2023/01/msg00038.html" }, { "source": "support@hackerone.com", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4561-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ], "url": "https://groups.google.com/g/rubyonrails-security/c/OWtmozPH9Ak" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://hackerone.com/reports/895727" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/07/msg00006.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2023/01/msg00038.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4561-1/" } ], "sourceIdentifier": "support@hackerone.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-784" } ], "source": "support@hackerone.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2013-03-01 05:40
Modified
2025-04-11 00:51
Severity ?
Summary
lib/rack/multipart.rb in Rack before 1.1.4, 1.2.x before 1.2.6, 1.3.x before 1.3.7, and 1.4.x before 1.4.2 uses an incorrect regular expression, which allows remote attackers to cause a denial of service (infinite loop) via a crafted Content-Disposion header.
References
▶ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | http://rack.github.com/ | ||
secalert@redhat.com | http://rhn.redhat.com/errata/RHSA-2013-0544.html | ||
secalert@redhat.com | http://rhn.redhat.com/errata/RHSA-2013-0548.html | ||
secalert@redhat.com | https://bugzilla.redhat.com/show_bug.cgi?id=895277 | ||
secalert@redhat.com | https://github.com/rack/rack/blob/master/README.rdoc | ||
secalert@redhat.com | https://github.com/rack/rack/commit/c9f65df37a151821eb88ddd1dc404b83e52c52d5 | ||
secalert@redhat.com | https://groups.google.com/forum/#%21msg/rack-devel/1w4_fWEgTdI/XAkSNHjtdTsJ | ||
af854a3a-2127-422b-91ae-364da2661108 | http://rack.github.com/ | ||
af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2013-0544.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2013-0548.html | ||
af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=895277 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/rack/rack/blob/master/README.rdoc | ||
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/rack/rack/commit/c9f65df37a151821eb88ddd1dc404b83e52c52d5 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://groups.google.com/forum/#%21msg/rack-devel/1w4_fWEgTdI/XAkSNHjtdTsJ |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
rack_project | rack | * | |
rack_project | rack | 0.1 | |
rack_project | rack | 0.2 | |
rack_project | rack | 0.3 | |
rack_project | rack | 0.4 | |
rack_project | rack | 0.9 | |
rack_project | rack | 0.9.1 | |
rack_project | rack | 1.0.0 | |
rack_project | rack | 1.0.1 | |
rack_project | rack | 1.1.0 | |
rack_project | rack | 1.1.2 | |
rack_project | rack | 1.2.0 | |
rack_project | rack | 1.2.1 | |
rack_project | rack | 1.2.2 | |
rack_project | rack | 1.2.3 | |
rack_project | rack | 1.2.4 | |
rack_project | rack | 1.3.0 | |
rack_project | rack | 1.3.1 | |
rack_project | rack | 1.3.2 | |
rack_project | rack | 1.3.3 | |
rack_project | rack | 1.3.4 | |
rack_project | rack | 1.3.5 | |
rack_project | rack | 1.3.6 | |
rack_project | rack | 1.4.0 | |
rack_project | rack | 1.4.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rack_project:rack:*:*:*:*:*:*:*:*", "matchCriteriaId": "A50E9D07-F580-412A-95F2-C6C8FCFCD682", "versionEndIncluding": "1.1.3", "vulnerable": true }, { "criteria": "cpe:2.3:a:rack_project:rack:0.1:*:*:*:*:*:*:*", "matchCriteriaId": "CE7791FC-C538-40FD-A17C-ED411C69A85C", "vulnerable": true }, { "criteria": "cpe:2.3:a:rack_project:rack:0.2:*:*:*:*:*:*:*", "matchCriteriaId": "E5562A1D-A6B4-428A-8FE1-9DAC89C542DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:rack_project:rack:0.3:*:*:*:*:*:*:*", "matchCriteriaId": "D6BB7248-CBCE-4846-BF64-27B87D369CB9", "vulnerable": true }, { "criteria": "cpe:2.3:a:rack_project:rack:0.4:*:*:*:*:*:*:*", "matchCriteriaId": "28A2D64A-D7A3-4721-9DE7-5EC2413C3190", "vulnerable": true }, { "criteria": "cpe:2.3:a:rack_project:rack:0.9:*:*:*:*:*:*:*", "matchCriteriaId": "2E99A79A-2412-4250-B178-DCCF36142E20", "vulnerable": true }, { "criteria": "cpe:2.3:a:rack_project:rack:0.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "58FE3034-4639-46A5-92D4-35B0EB6EFC79", "vulnerable": true }, { "criteria": "cpe:2.3:a:rack_project:rack:1.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "09E6FDA5-13E0-4F7C-919C-BAEA1DB26C20", "vulnerable": true }, { "criteria": "cpe:2.3:a:rack_project:rack:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "10941271-8454-4F38-8BDE-6B949EBA73B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:rack_project:rack:1.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "9A68A97A-A85D-4825-8D23-FDFB45894C89", "vulnerable": true }, { "criteria": "cpe:2.3:a:rack_project:rack:1.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "26E446D3-EBBC-449A-BD22-210D167DDFE3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rack_project:rack:1.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "F4ECE38D-E0CA-4C37-B6A7-385F90FA3BC6", "vulnerable": true }, { "criteria": "cpe:2.3:a:rack_project:rack:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "8B347613-F3F6-490C-AAE7-A5054B7D2892", "vulnerable": true }, { "criteria": "cpe:2.3:a:rack_project:rack:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "FDA365EF-8CF1-4040-9353-00F0BF0499C0", "vulnerable": true }, { "criteria": "cpe:2.3:a:rack_project:rack:1.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "A27A3B18-AB5A-4F99-AD51-12870745D9FA", "vulnerable": true }, { "criteria": "cpe:2.3:a:rack_project:rack:1.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "C207F012-CEEE-4173-A64D-61A8E8E02533", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rack_project:rack:1.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "98CBCA07-8EEC-49D0-8C17-7887ABB63ED6", "vulnerable": true }, { "criteria": "cpe:2.3:a:rack_project:rack:1.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "93B65658-8E1B-4832-822A-1C3770B33BB9", "vulnerable": true }, { "criteria": "cpe:2.3:a:rack_project:rack:1.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "9E9E3412-6D9C-46FC-806E-0E0D310D4DDE", "vulnerable": true }, { "criteria": "cpe:2.3:a:rack_project:rack:1.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "10A95FAF-3314-4F3F-8619-DAED41648AE3", "vulnerable": true }, { "criteria": "cpe:2.3:a:rack_project:rack:1.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "00901558-9028-4BDF-AFE6-502DF2632069", "vulnerable": true }, { "criteria": "cpe:2.3:a:rack_project:rack:1.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "5A8CBC63-DBA8-4A4E-87D7-5B891CDF7091", "vulnerable": true }, { "criteria": "cpe:2.3:a:rack_project:rack:1.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "8F6A8485-8F4B-42E8-81ED-84CE5CE8E27D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rack_project:rack:1.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "2A3DD73E-6BD4-4C18-A4B8-AFA6860A4585", "vulnerable": true }, { "criteria": "cpe:2.3:a:rack_project:rack:1.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "95E3FF6F-58C3-4491-BBD1-C4C13287A07D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "lib/rack/multipart.rb in Rack before 1.1.4, 1.2.x before 1.2.6, 1.3.x before 1.3.7, and 1.4.x before 1.4.2 uses an incorrect regular expression, which allows remote attackers to cause a denial of service (infinite loop) via a crafted Content-Disposion header." }, { "lang": "es", "value": "lib/rack/multipart.rb en Rack anterior a v1.1.4 anterior a v1.1.5, v1.2.x anterior a v1.2.6, v1.3.x anterior a v1.3.7, y v1.4.x anterior a v1.4.2, emplea incorrectamente las expresiones regulares lo que permite a atacantes remotos provocar una denegaci\u00f3n de servicio (bucle infinito) a trav\u00e9s de una cabecera manipulada del tipo Content-Disposion." } ], "id": "CVE-2012-6109", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-03-01T05:40:16.863", "references": [ { "source": "secalert@redhat.com", "url": "http://rack.github.com/" }, { "source": "secalert@redhat.com", "url": "http://rhn.redhat.com/errata/RHSA-2013-0544.html" }, { "source": "secalert@redhat.com", "url": "http://rhn.redhat.com/errata/RHSA-2013-0548.html" }, { "source": "secalert@redhat.com", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=895277" }, { "source": "secalert@redhat.com", "url": "https://github.com/rack/rack/blob/master/README.rdoc" }, { "source": "secalert@redhat.com", "url": "https://github.com/rack/rack/commit/c9f65df37a151821eb88ddd1dc404b83e52c52d5" }, { "source": "secalert@redhat.com", "url": "https://groups.google.com/forum/#%21msg/rack-devel/1w4_fWEgTdI/XAkSNHjtdTsJ" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rack.github.com/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2013-0544.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2013-0548.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=895277" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://github.com/rack/rack/blob/master/README.rdoc" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://github.com/rack/rack/commit/c9f65df37a151821eb88ddd1dc404b83e52c52d5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://groups.google.com/forum/#%21msg/rack-devel/1w4_fWEgTdI/XAkSNHjtdTsJ" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-12-30 01:55
Modified
2025-04-11 00:51
Severity ?
Summary
Rack before 1.1.3, 1.2.x before 1.2.5, and 1.3.x before 1.3.6 computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://archives.neohapsis.com/archives/bugtraq/2011-12/0181.html | ||
cve@mitre.org | http://www.debian.org/security/2013/dsa-2783 | ||
cve@mitre.org | http://www.kb.cert.org/vuls/id/903934 | US Government Resource | |
cve@mitre.org | http://www.nruns.com/_downloads/advisory28122011.pdf | ||
cve@mitre.org | http://www.ocert.org/advisories/ocert-2011-003.html | ||
cve@mitre.org | https://gist.github.com/52bbc6b9cc19ce330829 | Exploit | |
af854a3a-2127-422b-91ae-364da2661108 | http://archives.neohapsis.com/archives/bugtraq/2011-12/0181.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2013/dsa-2783 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.kb.cert.org/vuls/id/903934 | US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.nruns.com/_downloads/advisory28122011.pdf | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.ocert.org/advisories/ocert-2011-003.html | ||
af854a3a-2127-422b-91ae-364da2661108 | https://gist.github.com/52bbc6b9cc19ce330829 | Exploit |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
rack_project | rack | * | |
rack_project | rack | 1.2.0 | |
rack_project | rack | 1.2.1 | |
rack_project | rack | 1.2.2 | |
rack_project | rack | 1.2.3 | |
rack_project | rack | 1.2.4 | |
rack_project | rack | 1.3.0 | |
rack_project | rack | 1.3.1 | |
rack_project | rack | 1.3.2 | |
rack_project | rack | 1.3.3 | |
rack_project | rack | 1.3.4 | |
rack_project | rack | 1.3.5 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rack_project:rack:*:*:*:*:*:*:*:*", "matchCriteriaId": "FC25AA62-8839-47F9-B215-8B08343D4DE2", "versionEndIncluding": "1.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:rack_project:rack:1.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "F4ECE38D-E0CA-4C37-B6A7-385F90FA3BC6", "vulnerable": true }, { "criteria": "cpe:2.3:a:rack_project:rack:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "8B347613-F3F6-490C-AAE7-A5054B7D2892", "vulnerable": true }, { "criteria": "cpe:2.3:a:rack_project:rack:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "FDA365EF-8CF1-4040-9353-00F0BF0499C0", "vulnerable": true }, { "criteria": "cpe:2.3:a:rack_project:rack:1.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "A27A3B18-AB5A-4F99-AD51-12870745D9FA", "vulnerable": true }, { "criteria": "cpe:2.3:a:rack_project:rack:1.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "C207F012-CEEE-4173-A64D-61A8E8E02533", "vulnerable": true }, { "criteria": "cpe:2.3:a:rack_project:rack:1.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "98CBCA07-8EEC-49D0-8C17-7887ABB63ED6", "vulnerable": true }, { "criteria": "cpe:2.3:a:rack_project:rack:1.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "93B65658-8E1B-4832-822A-1C3770B33BB9", "vulnerable": true }, { "criteria": "cpe:2.3:a:rack_project:rack:1.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "9E9E3412-6D9C-46FC-806E-0E0D310D4DDE", "vulnerable": true }, { "criteria": "cpe:2.3:a:rack_project:rack:1.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "10A95FAF-3314-4F3F-8619-DAED41648AE3", "vulnerable": true }, { "criteria": "cpe:2.3:a:rack_project:rack:1.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "00901558-9028-4BDF-AFE6-502DF2632069", "vulnerable": true }, { "criteria": "cpe:2.3:a:rack_project:rack:1.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "5A8CBC63-DBA8-4A4E-87D7-5B891CDF7091", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Rack before 1.1.3, 1.2.x before 1.2.5, and 1.3.x before 1.3.6 computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters." }, { "lang": "es", "value": "Rack anterior a v1.1.3, v1.2.x anterior a v1.2.5, v1.3.6 y v1.3.x calcula los valores hash de los par\u00e1metros de forma, sin restringir la capacidad de desencadenar colisiones hash predecible, lo que permite a atacantes remotos provocar una denegaci\u00f3n de servicio (CPU consumo) mediante el env\u00edo de gran cantidad de par\u00e1metros a mano." } ], "id": "CVE-2011-5036", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-12-30T01:55:01.687", "references": [ { "source": "cve@mitre.org", "url": "http://archives.neohapsis.com/archives/bugtraq/2011-12/0181.html" }, { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2013/dsa-2783" }, { "source": "cve@mitre.org", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/903934" }, { "source": "cve@mitre.org", "url": "http://www.nruns.com/_downloads/advisory28122011.pdf" }, { "source": "cve@mitre.org", "url": "http://www.ocert.org/advisories/ocert-2011-003.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "https://gist.github.com/52bbc6b9cc19ce330829" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://archives.neohapsis.com/archives/bugtraq/2011-12/0181.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2013/dsa-2783" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/903934" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.nruns.com/_downloads/advisory28122011.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ocert.org/advisories/ocert-2011-003.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "https://gist.github.com/52bbc6b9cc19ce330829" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-310" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-12-05 22:15
Modified
2024-11-21 07:02
Severity ?
Summary
A possible denial of service vulnerability exists in Rack <2.0.9.1, <2.1.4.1 and <2.2.3.1 in the multipart parsing component of Rack.
References
▶ | URL | Tags | |
---|---|---|---|
support@hackerone.com | https://discuss.rubyonrails.org/t/cve-2022-30122-denial-of-service-vulnerability-in-rack-multipart-parsing/80729 | Third Party Advisory | |
support@hackerone.com | https://security.gentoo.org/glsa/202310-18 | Third Party Advisory | |
support@hackerone.com | https://security.netapp.com/advisory/ntap-20231208-0012/ | Third Party Advisory | |
support@hackerone.com | https://www.debian.org/security/2023/dsa-5530 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://discuss.rubyonrails.org/t/cve-2022-30122-denial-of-service-vulnerability-in-rack-multipart-parsing/80729 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.gentoo.org/glsa/202310-18 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20231208-0012/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.debian.org/security/2023/dsa-5530 | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
rack_project | rack | * | |
rack_project | rack | * | |
rack_project | rack | * | |
debian | debian_linux | 11.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rack_project:rack:*:*:*:*:*:*:*:*", "matchCriteriaId": "442EB5AF-A390-4A62-8B4E-8A2C082864D3", "versionEndExcluding": "2.0.9.1", "versionStartIncluding": "1.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:rack_project:rack:*:*:*:*:*:*:*:*", "matchCriteriaId": "32E774AF-E7BB-45EB-B5E4-66F8F5D36285", "versionEndExcluding": "2.1.4.1", "versionStartIncluding": "2.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:rack_project:rack:*:*:*:*:*:*:*:*", "matchCriteriaId": "6145EE1D-85D5-4744-BA51-88EC52FF2891", "versionEndExcluding": "2.2.3.1", "versionStartIncluding": "2.2.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A possible denial of service vulnerability exists in Rack \u003c2.0.9.1, \u003c2.1.4.1 and \u003c2.2.3.1 in the multipart parsing component of Rack." }, { "lang": "es", "value": "Existe una posible vulnerabilidad de Denegaci\u00f3n de Servicio (DoS) en Rack \u0026lt;2.0.9.1, \u0026lt;2.1.4.1 y \u0026lt;2.2.3.1 en el componente de an\u00e1lisis multiparte de Rack." } ], "id": "CVE-2022-30122", "lastModified": "2024-11-21T07:02:12.160", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-12-05T22:15:10.227", "references": [ { "source": "support@hackerone.com", "tags": [ "Third Party Advisory" ], "url": "https://discuss.rubyonrails.org/t/cve-2022-30122-denial-of-service-vulnerability-in-rack-multipart-parsing/80729" }, { "source": "support@hackerone.com", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202310-18" }, { "source": "support@hackerone.com", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20231208-0012/" }, { "source": "support@hackerone.com", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2023/dsa-5530" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://discuss.rubyonrails.org/t/cve-2022-30122-denial-of-service-vulnerability-in-rack-multipart-parsing/80729" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202310-18" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20231208-0012/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2023/dsa-5530" } ], "sourceIdentifier": "support@hackerone.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-400" } ], "source": "support@hackerone.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-1333" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2015-07-26 22:59
Modified
2025-04-12 10:46
Severity ?
Summary
lib/rack/utils.rb in Rack before 1.5.4 and 1.6.x before 1.6.2, as used with Ruby on Rails 3.x and 4.x and other products, allows remote attackers to cause a denial of service (SystemStackError) via a request with a large parameter depth.
References
▶ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | http://lists.fedoraproject.org/pipermail/package-announce/2015-August/164173.html | ||
secalert@redhat.com | http://lists.fedoraproject.org/pipermail/package-announce/2015-August/165180.html | ||
secalert@redhat.com | http://lists.opensuse.org/opensuse-updates/2015-07/msg00040.html | Third Party Advisory | |
secalert@redhat.com | http://lists.opensuse.org/opensuse-updates/2015-07/msg00043.html | Third Party Advisory | |
secalert@redhat.com | http://lists.opensuse.org/opensuse-updates/2015-07/msg00044.html | Third Party Advisory | |
secalert@redhat.com | http://openwall.com/lists/oss-security/2015/06/16/14 | Mailing List, Third Party Advisory | |
secalert@redhat.com | http://rhn.redhat.com/errata/RHSA-2015-2290.html | ||
secalert@redhat.com | http://www.debian.org/security/2015/dsa-3322 | ||
secalert@redhat.com | http://www.securityfocus.com/bid/75232 | ||
secalert@redhat.com | https://github.com/rack/rack/blob/master/HISTORY.md | Issue Tracking, Patch, Vendor Advisory | |
secalert@redhat.com | https://groups.google.com/forum/message/raw?msg=rubyonrails-security/gcUbICUmKMc/qiCotVZwXrMJ | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.fedoraproject.org/pipermail/package-announce/2015-August/164173.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.fedoraproject.org/pipermail/package-announce/2015-August/165180.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-updates/2015-07/msg00040.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-updates/2015-07/msg00043.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-updates/2015-07/msg00044.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://openwall.com/lists/oss-security/2015/06/16/14 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2015-2290.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2015/dsa-3322 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/75232 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/rack/rack/blob/master/HISTORY.md | Issue Tracking, Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://groups.google.com/forum/message/raw?msg=rubyonrails-security/gcUbICUmKMc/qiCotVZwXrMJ | Mailing List, Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
rack_project | rack | * | |
rack_project | rack | 1.6.0 | |
rack_project | rack | 1.6.1 | |
opensuse | opensuse | 13.1 | |
opensuse | opensuse | 13.2 | |
debian | debian_linux | 7.0 | |
debian | debian_linux | 8.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rack_project:rack:*:*:*:*:*:*:*:*", "matchCriteriaId": "31ACD93B-B2C5-4991-8C7C-DF4969109B2A", "versionEndIncluding": "1.5.3", "vulnerable": true }, { "criteria": "cpe:2.3:a:rack_project:rack:1.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "334AC93B-39D9-4664-90D5-CC5B6D8DB0A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:rack_project:rack:1.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "9B413351-9FC2-4F4B-8C42-FFF0E5784DCD", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "matchCriteriaId": "A10BC294-9196-425F-9FB0-B1625465B47F", "vulnerable": true }, { "criteria": "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "matchCriteriaId": "03117DF1-3BEC-4B8D-AD63-DBBDB2126081", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "16F59A04-14CF-49E2-9973-645477EA09DA", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "lib/rack/utils.rb in Rack before 1.5.4 and 1.6.x before 1.6.2, as used with Ruby on Rails 3.x and 4.x and other products, allows remote attackers to cause a denial of service (SystemStackError) via a request with a large parameter depth." }, { "lang": "es", "value": "Vulnerabilidad en lib/rack/utils.rb en Rack en versiones anteriores a 1.5.4 y 1.6.x anteriores a 1.6.2, tal como se utiliza con Ruby on Rails en versiones 3.x y 4.x y en otros productos, permite a atacantes remotos provocar una denegaci\u00f3n de servicio (SystemStackError) a trav\u00e9s de una solicitud con un par\u00e1metro de gran tama\u00f1o." } ], "id": "CVE-2015-3225", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2015-07-26T22:59:04.070", "references": [ { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-August/164173.html" }, { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-August/165180.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-updates/2015-07/msg00040.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-updates/2015-07/msg00043.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-updates/2015-07/msg00044.html" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://openwall.com/lists/oss-security/2015/06/16/14" }, { "source": "secalert@redhat.com", "url": "http://rhn.redhat.com/errata/RHSA-2015-2290.html" }, { "source": "secalert@redhat.com", "url": "http://www.debian.org/security/2015/dsa-3322" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/75232" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://github.com/rack/rack/blob/master/HISTORY.md" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://groups.google.com/forum/message/raw?msg=rubyonrails-security/gcUbICUmKMc/qiCotVZwXrMJ" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-August/164173.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-August/165180.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-updates/2015-07/msg00040.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-updates/2015-07/msg00043.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-updates/2015-07/msg00044.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://openwall.com/lists/oss-security/2015/06/16/14" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2015-2290.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2015/dsa-3322" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/75232" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://github.com/rack/rack/blob/master/HISTORY.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://groups.google.com/forum/message/raw?msg=rubyonrails-security/gcUbICUmKMc/qiCotVZwXrMJ" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-19" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2013-03-01 05:40
Modified
2025-04-11 00:51
Severity ?
Summary
Unspecified vulnerability in Rack::Auth::AbstractRequest in Rack 1.1.x before 1.1.5, 1.2.x before 1.2.7, 1.3.x before 1.3.9, and 1.4.x before 1.4.4 allows remote attackers to cause a denial of service via unknown vectors related to "symbolized arbitrary strings."
References
▶ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | http://lists.opensuse.org/opensuse-updates/2013-03/msg00048.html | ||
secalert@redhat.com | http://rhn.redhat.com/errata/RHSA-2013-0544.html | ||
secalert@redhat.com | http://rhn.redhat.com/errata/RHSA-2013-0548.html | ||
secalert@redhat.com | http://www.debian.org/security/2013/dsa-2783 | ||
secalert@redhat.com | https://bugzilla.redhat.com/show_bug.cgi?id=895384 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-updates/2013-03/msg00048.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2013-0544.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2013-0548.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2013/dsa-2783 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=895384 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
rack_project | rack | 1.1.0 | |
rack_project | rack | 1.1.2 | |
rack_project | rack | 1.1.3 | |
rack_project | rack | 1.1.4 | |
rack_project | rack | 1.2.0 | |
rack_project | rack | 1.2.1 | |
rack_project | rack | 1.2.2 | |
rack_project | rack | 1.2.3 | |
rack_project | rack | 1.2.4 | |
rack_project | rack | 1.2.6 | |
rack_project | rack | 1.3.0 | |
rack_project | rack | 1.3.1 | |
rack_project | rack | 1.3.2 | |
rack_project | rack | 1.3.3 | |
rack_project | rack | 1.3.4 | |
rack_project | rack | 1.3.5 | |
rack_project | rack | 1.3.6 | |
rack_project | rack | 1.3.7 | |
rack_project | rack | 1.3.8 | |
rack_project | rack | 1.4.0 | |
rack_project | rack | 1.4.1 | |
rack_project | rack | 1.4.2 | |
rack_project | rack | 1.4.3 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rack_project:rack:1.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "9A68A97A-A85D-4825-8D23-FDFB45894C89", "vulnerable": true }, { "criteria": "cpe:2.3:a:rack_project:rack:1.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "26E446D3-EBBC-449A-BD22-210D167DDFE3", "vulnerable": true }, { "criteria": "cpe:2.3:a:rack_project:rack:1.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "E9B36F0F-C7B3-40FA-8B83-0F3EBDE38D91", "vulnerable": true }, { "criteria": "cpe:2.3:a:rack_project:rack:1.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "46D0BD4F-B060-425E-8EC9-B79795635C41", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rack_project:rack:1.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "F4ECE38D-E0CA-4C37-B6A7-385F90FA3BC6", "vulnerable": true }, { "criteria": "cpe:2.3:a:rack_project:rack:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "8B347613-F3F6-490C-AAE7-A5054B7D2892", "vulnerable": true }, { "criteria": "cpe:2.3:a:rack_project:rack:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "FDA365EF-8CF1-4040-9353-00F0BF0499C0", "vulnerable": true }, { "criteria": "cpe:2.3:a:rack_project:rack:1.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "A27A3B18-AB5A-4F99-AD51-12870745D9FA", "vulnerable": true }, { "criteria": "cpe:2.3:a:rack_project:rack:1.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "C207F012-CEEE-4173-A64D-61A8E8E02533", "vulnerable": true }, { "criteria": "cpe:2.3:a:rack_project:rack:1.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "C9E6D296-9514-40E4-A931-1C303C214D0A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rack_project:rack:1.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "98CBCA07-8EEC-49D0-8C17-7887ABB63ED6", "vulnerable": true }, { "criteria": "cpe:2.3:a:rack_project:rack:1.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "93B65658-8E1B-4832-822A-1C3770B33BB9", "vulnerable": true }, { "criteria": "cpe:2.3:a:rack_project:rack:1.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "9E9E3412-6D9C-46FC-806E-0E0D310D4DDE", "vulnerable": true }, { "criteria": "cpe:2.3:a:rack_project:rack:1.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "10A95FAF-3314-4F3F-8619-DAED41648AE3", "vulnerable": true }, { "criteria": "cpe:2.3:a:rack_project:rack:1.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "00901558-9028-4BDF-AFE6-502DF2632069", "vulnerable": true }, { "criteria": "cpe:2.3:a:rack_project:rack:1.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "5A8CBC63-DBA8-4A4E-87D7-5B891CDF7091", "vulnerable": true }, { "criteria": "cpe:2.3:a:rack_project:rack:1.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "8F6A8485-8F4B-42E8-81ED-84CE5CE8E27D", "vulnerable": true }, { "criteria": "cpe:2.3:a:rack_project:rack:1.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "FBEE2AAF-1575-44F7-9B1B-87504E0425E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:rack_project:rack:1.3.8:*:*:*:*:*:*:*", "matchCriteriaId": "384FC6D2-443E-4810-B40A-EB90E74CC692", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rack_project:rack:1.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "2A3DD73E-6BD4-4C18-A4B8-AFA6860A4585", "vulnerable": true }, { "criteria": "cpe:2.3:a:rack_project:rack:1.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "95E3FF6F-58C3-4491-BBD1-C4C13287A07D", "vulnerable": true }, { "criteria": "cpe:2.3:a:rack_project:rack:1.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "C04A5634-62C7-4B01-B644-06A6A1D5A828", "vulnerable": true }, { "criteria": "cpe:2.3:a:rack_project:rack:1.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "290B1557-33F7-4717-B3C4-081FECF71BD5", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in Rack::Auth::AbstractRequest in Rack 1.1.x before 1.1.5, 1.2.x before 1.2.7, 1.3.x before 1.3.9, and 1.4.x before 1.4.4 allows remote attackers to cause a denial of service via unknown vectors related to \"symbolized arbitrary strings.\"" }, { "lang": "es", "value": "Vulnerabilidad no especificada en Rack::Auth::AbstractRequest en Rack v1.1.x anterior a v1.1.5, v1.2.x anterior a v1.2.7, v1.3.x anterior a v1.3.9, y v1.4.x anterior a v1.4.4, permite a atacantes remotos provocar una denegaci\u00f3n de servicio a trav\u00e9s de vectores desconocidos relacionados con \"symbolized arbitrary strings.\"" } ], "id": "CVE-2013-0184", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-03-01T05:40:17.097", "references": [ { "source": "secalert@redhat.com", "url": "http://lists.opensuse.org/opensuse-updates/2013-03/msg00048.html" }, { "source": "secalert@redhat.com", "url": "http://rhn.redhat.com/errata/RHSA-2013-0544.html" }, { "source": "secalert@redhat.com", "url": "http://rhn.redhat.com/errata/RHSA-2013-0548.html" }, { "source": "secalert@redhat.com", "url": "http://www.debian.org/security/2013/dsa-2783" }, { "source": "secalert@redhat.com", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=895384" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2013-03/msg00048.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2013-0544.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2013-0548.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2013/dsa-2783" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=895384" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-11-13 23:29
Modified
2024-11-21 03:52
Severity ?
Summary
There is a possible DoS vulnerability in the multipart parser in Rack before 2.0.6. Specially crafted requests can cause the multipart parser to enter a pathological state, causing the parser to use CPU resources disproportionate to the request size.
References
▶ | URL | Tags | |
---|---|---|---|
support@hackerone.com | https://access.redhat.com/errata/RHSA-2019:3172 | ||
support@hackerone.com | https://groups.google.com/forum/#%21msg/rubyonrails-security/U_x-YkfuVTg/xhvYAmp6AAAJ | ||
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2019:3172 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://groups.google.com/forum/#%21msg/rubyonrails-security/U_x-YkfuVTg/xhvYAmp6AAAJ |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
rack_project | rack | 2.0.4 | |
rack_project | rack | 2.0.5 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rack_project:rack:2.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "0D44D7B2-AB7B-4707-8B72-E6E5F5DF9E7C", "vulnerable": true }, { "criteria": "cpe:2.3:a:rack_project:rack:2.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "86B4E304-9FDE-46CB-A52D-7E4870DCFE01", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "There is a possible DoS vulnerability in the multipart parser in Rack before 2.0.6. Specially crafted requests can cause the multipart parser to enter a pathological state, causing the parser to use CPU resources disproportionate to the request size." }, { "lang": "es", "value": "Hay una posible vulnerabilidad de denegaci\u00f3n de servicio (DoS) en el analizador multiparte en Rack en versiones anteriores a la 2.0.6. Las peticiones especialmente manipuladas pueden provocar que el analizador multiparte entre en estado patol\u00f3gico, haciendo que emplee una cantidad de recursos de CPU desproporcionada al tama\u00f1o de la petici\u00f3n." } ], "id": "CVE-2018-16470", "lastModified": "2024-11-21T03:52:49.123", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-11-13T23:29:00.263", "references": [ { "source": "support@hackerone.com", "url": "https://access.redhat.com/errata/RHSA-2019:3172" }, { "source": "support@hackerone.com", "url": "https://groups.google.com/forum/#%21msg/rubyonrails-security/U_x-YkfuVTg/xhvYAmp6AAAJ" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://access.redhat.com/errata/RHSA-2019:3172" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://groups.google.com/forum/#%21msg/rubyonrails-security/U_x-YkfuVTg/xhvYAmp6AAAJ" } ], "sourceIdentifier": "support@hackerone.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-400" } ], "source": "support@hackerone.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-400" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-07-02 19:15
Modified
2024-11-21 05:38
Severity ?
Summary
A directory traversal vulnerability exists in rack < 2.2.0 that allows an attacker perform directory traversal vulnerability in the Rack::Directory app that is bundled with Rack which could result in information disclosure.
References
▶ | URL | Tags | |
---|---|---|---|
support@hackerone.com | https://groups.google.com/g/rubyonrails-security/c/IOO1vNZTzPA | Mailing List, Patch, Third Party Advisory | |
support@hackerone.com | https://hackerone.com/reports/434404 | Permissions Required, Third Party Advisory | |
support@hackerone.com | https://lists.debian.org/debian-lts-announce/2020/07/msg00006.html | Mailing List, Third Party Advisory | |
support@hackerone.com | https://lists.debian.org/debian-lts-announce/2023/01/msg00038.html | Mailing List, Third Party Advisory | |
support@hackerone.com | https://usn.ubuntu.com/4561-1/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://groups.google.com/g/rubyonrails-security/c/IOO1vNZTzPA | Mailing List, Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://hackerone.com/reports/434404 | Permissions Required, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2020/07/msg00006.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2023/01/msg00038.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/4561-1/ | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
rack_project | rack | * | |
debian | debian_linux | 9.0 | |
debian | debian_linux | 10.0 | |
canonical | ubuntu_linux | 18.04 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rack_project:rack:*:*:*:*:*:*:*:*", "matchCriteriaId": "7CBE1B06-8C22-47E1-A785-3394770349DB", "versionEndExcluding": "2.2.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A directory traversal vulnerability exists in rack \u003c 2.2.0 that allows an attacker perform directory traversal vulnerability in the Rack::Directory app that is bundled with Rack which could result in information disclosure." }, { "lang": "es", "value": "Se presenta una vulnerabilidad de salto de directorio en rack versiones anteriores a 2.2.0, que permite a un atacante realizar una vulnerabilidad de salto de directorio en la aplicaci\u00f3n Rack::Directory que esta incorporada con Rack, lo que podr\u00eda resultar en una divulgaci\u00f3n de informaci\u00f3n" } ], "id": "CVE-2020-8161", "lastModified": "2024-11-21T05:38:24.667", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 4.0, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-07-02T19:15:12.357", "references": [ { "source": "support@hackerone.com", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ], "url": "https://groups.google.com/g/rubyonrails-security/c/IOO1vNZTzPA" }, { "source": "support@hackerone.com", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "https://hackerone.com/reports/434404" }, { "source": "support@hackerone.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/07/msg00006.html" }, { "source": "support@hackerone.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2023/01/msg00038.html" }, { "source": "support@hackerone.com", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4561-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ], "url": "https://groups.google.com/g/rubyonrails-security/c/IOO1vNZTzPA" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "https://hackerone.com/reports/434404" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/07/msg00006.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2023/01/msg00038.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4561-1/" } ], "sourceIdentifier": "support@hackerone.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-548" } ], "source": "support@hackerone.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-22" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2013-02-08 20:55
Modified
2025-04-11 00:51
Severity ?
Summary
Rack::Session::Cookie in Rack 1.5.x before 1.5.2, 1.4.x before 1.4.5, 1.3.x before 1.3.10, 1.2.x before 1.2.8, and 1.1.x before 1.1.6 allows remote attackers to guess the session cookie, gain privileges, and execute arbitrary code via a timing attack involving an HMAC comparison function that does not run in constant time.
References
▶ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | http://lists.opensuse.org/opensuse-updates/2013-03/msg00048.html | ||
secalert@redhat.com | http://rack.github.com/ | Vendor Advisory | |
secalert@redhat.com | http://rhn.redhat.com/errata/RHSA-2013-0686.html | ||
secalert@redhat.com | http://secunia.com/advisories/52033 | Vendor Advisory | |
secalert@redhat.com | http://secunia.com/advisories/52134 | Vendor Advisory | |
secalert@redhat.com | http://secunia.com/advisories/52774 | ||
secalert@redhat.com | http://www.debian.org/security/2013/dsa-2783 | ||
secalert@redhat.com | http://www.osvdb.org/89939 | ||
secalert@redhat.com | https://bugzilla.redhat.com/show_bug.cgi?id=909071 | ||
secalert@redhat.com | https://gist.github.com/codahale/f9f3781f7b54985bee94 | ||
secalert@redhat.com | https://github.com/rack/rack/commit/0cd7e9aa397f8ebb3b8481d67dbac8b4863a7f07 | ||
secalert@redhat.com | https://github.com/rack/rack/commit/9a81b961457805f6d1a5c275d053068440421e11 | ||
secalert@redhat.com | https://groups.google.com/d/msg/rack-devel/xKrHVWeNvDM/4ZGA576CnK4J | ||
secalert@redhat.com | https://groups.google.com/forum/#%21msg/rack-devel/RnQxm6i13C4/xfakH81yWvgJ | ||
secalert@redhat.com | https://groups.google.com/forum/#%21msg/rack-devel/bf937jPZxJM/1s6x95vIhmAJ | ||
secalert@redhat.com | https://groups.google.com/forum/#%21msg/rack-devel/hz-liLb9fKE/8jvVWU6xYiYJ | ||
secalert@redhat.com | https://groups.google.com/forum/#%21msg/rack-devel/mZsuRonD7G8/DpZIOmMLbOgJ | ||
secalert@redhat.com | https://puppet.com/security/cve/cve-2013-0263 | ||
secalert@redhat.com | https://twitter.com/coda/statuses/299732877745197056 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-updates/2013-03/msg00048.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://rack.github.com/ | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2013-0686.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/52033 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/52134 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/52774 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2013/dsa-2783 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.osvdb.org/89939 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=909071 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://gist.github.com/codahale/f9f3781f7b54985bee94 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/rack/rack/commit/0cd7e9aa397f8ebb3b8481d67dbac8b4863a7f07 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/rack/rack/commit/9a81b961457805f6d1a5c275d053068440421e11 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://groups.google.com/d/msg/rack-devel/xKrHVWeNvDM/4ZGA576CnK4J | ||
af854a3a-2127-422b-91ae-364da2661108 | https://groups.google.com/forum/#%21msg/rack-devel/RnQxm6i13C4/xfakH81yWvgJ | ||
af854a3a-2127-422b-91ae-364da2661108 | https://groups.google.com/forum/#%21msg/rack-devel/bf937jPZxJM/1s6x95vIhmAJ | ||
af854a3a-2127-422b-91ae-364da2661108 | https://groups.google.com/forum/#%21msg/rack-devel/hz-liLb9fKE/8jvVWU6xYiYJ | ||
af854a3a-2127-422b-91ae-364da2661108 | https://groups.google.com/forum/#%21msg/rack-devel/mZsuRonD7G8/DpZIOmMLbOgJ | ||
af854a3a-2127-422b-91ae-364da2661108 | https://puppet.com/security/cve/cve-2013-0263 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://twitter.com/coda/statuses/299732877745197056 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
rack_project | rack | 1.5.0 | |
rack_project | rack | 1.5.1 | |
rack_project | rack | 1.4.0 | |
rack_project | rack | 1.4.1 | |
rack_project | rack | 1.4.2 | |
rack_project | rack | 1.4.3 | |
rack_project | rack | 1.4.4 | |
rack_project | rack | 1.3.0 | |
rack_project | rack | 1.3.1 | |
rack_project | rack | 1.3.2 | |
rack_project | rack | 1.3.3 | |
rack_project | rack | 1.3.4 | |
rack_project | rack | 1.3.5 | |
rack_project | rack | 1.3.6 | |
rack_project | rack | 1.3.7 | |
rack_project | rack | 1.3.8 | |
rack_project | rack | 1.3.9 | |
rack_project | rack | 1.2.0 | |
rack_project | rack | 1.2.1 | |
rack_project | rack | 1.2.2 | |
rack_project | rack | 1.2.3 | |
rack_project | rack | 1.2.4 | |
rack_project | rack | 1.2.6 | |
rack_project | rack | 1.2.7 | |
rack_project | rack | 1.1.0 | |
rack_project | rack | 1.1.4 | |
rack_project | rack | 1.1.5 | |
rack_project | rack | 1.1.6 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rack_project:rack:1.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "F55AF59F-CA0C-4F48-81BF-C9316672886D", "vulnerable": true }, { "criteria": "cpe:2.3:a:rack_project:rack:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "8DA5F2A1-86CC-4836-A75F-9B275884683A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rack_project:rack:1.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "2A3DD73E-6BD4-4C18-A4B8-AFA6860A4585", "vulnerable": true }, { "criteria": "cpe:2.3:a:rack_project:rack:1.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "95E3FF6F-58C3-4491-BBD1-C4C13287A07D", "vulnerable": true }, { "criteria": "cpe:2.3:a:rack_project:rack:1.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "C04A5634-62C7-4B01-B644-06A6A1D5A828", "vulnerable": true }, { "criteria": "cpe:2.3:a:rack_project:rack:1.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "290B1557-33F7-4717-B3C4-081FECF71BD5", "vulnerable": true }, { "criteria": "cpe:2.3:a:rack_project:rack:1.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "FAB99ED2-4E74-4652-9A04-A46436F151E6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rack_project:rack:1.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "98CBCA07-8EEC-49D0-8C17-7887ABB63ED6", "vulnerable": true }, { "criteria": "cpe:2.3:a:rack_project:rack:1.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "93B65658-8E1B-4832-822A-1C3770B33BB9", "vulnerable": true }, { "criteria": "cpe:2.3:a:rack_project:rack:1.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "9E9E3412-6D9C-46FC-806E-0E0D310D4DDE", "vulnerable": true }, { "criteria": "cpe:2.3:a:rack_project:rack:1.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "10A95FAF-3314-4F3F-8619-DAED41648AE3", "vulnerable": true }, { "criteria": "cpe:2.3:a:rack_project:rack:1.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "00901558-9028-4BDF-AFE6-502DF2632069", "vulnerable": true }, { "criteria": "cpe:2.3:a:rack_project:rack:1.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "5A8CBC63-DBA8-4A4E-87D7-5B891CDF7091", "vulnerable": true }, { "criteria": "cpe:2.3:a:rack_project:rack:1.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "8F6A8485-8F4B-42E8-81ED-84CE5CE8E27D", "vulnerable": true }, { "criteria": "cpe:2.3:a:rack_project:rack:1.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "FBEE2AAF-1575-44F7-9B1B-87504E0425E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:rack_project:rack:1.3.8:*:*:*:*:*:*:*", "matchCriteriaId": "384FC6D2-443E-4810-B40A-EB90E74CC692", "vulnerable": true }, { "criteria": "cpe:2.3:a:rack_project:rack:1.3.9:*:*:*:*:*:*:*", "matchCriteriaId": "DB5D71EF-9B75-4031-8893-2630FC041444", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rack_project:rack:1.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "F4ECE38D-E0CA-4C37-B6A7-385F90FA3BC6", "vulnerable": true }, { "criteria": "cpe:2.3:a:rack_project:rack:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "8B347613-F3F6-490C-AAE7-A5054B7D2892", "vulnerable": true }, { "criteria": "cpe:2.3:a:rack_project:rack:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "FDA365EF-8CF1-4040-9353-00F0BF0499C0", "vulnerable": true }, { "criteria": "cpe:2.3:a:rack_project:rack:1.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "A27A3B18-AB5A-4F99-AD51-12870745D9FA", "vulnerable": true }, { "criteria": "cpe:2.3:a:rack_project:rack:1.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "C207F012-CEEE-4173-A64D-61A8E8E02533", "vulnerable": true }, { "criteria": "cpe:2.3:a:rack_project:rack:1.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "C9E6D296-9514-40E4-A931-1C303C214D0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:rack_project:rack:1.2.7:*:*:*:*:*:*:*", "matchCriteriaId": "C17E27F8-2348-4642-9E7E-5FA60C9C0E6C", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rack_project:rack:1.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "9A68A97A-A85D-4825-8D23-FDFB45894C89", "vulnerable": true }, { "criteria": "cpe:2.3:a:rack_project:rack:1.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "46D0BD4F-B060-425E-8EC9-B79795635C41", "vulnerable": true }, { "criteria": "cpe:2.3:a:rack_project:rack:1.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "F4FA282B-BE5C-4B92-A1DC-A00F5A6EEFF0", "vulnerable": true }, { "criteria": "cpe:2.3:a:rack_project:rack:1.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "01C614AE-D333-49C4-B65D-9FD7B7445AC6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Rack::Session::Cookie in Rack 1.5.x before 1.5.2, 1.4.x before 1.4.5, 1.3.x before 1.3.10, 1.2.x before 1.2.8, and 1.1.x before 1.1.6 allows remote attackers to guess the session cookie, gain privileges, and execute arbitrary code via a timing attack involving an HMAC comparison function that does not run in constant time." }, { "lang": "es", "value": "Rack::Sesi\u00f3n::Cookie en rack v1.5.x antes de v1.5.2, v1.4.x antes de v1.4.5, v1.3.x antes de v1.3.10, v1.2.x antes de v1.2.8, antes de v1.1.x y v1.1.6 permite atacantes remotos para adivinar la cookie de sesi\u00f3n, los privilegios de ganancia, y ejecutar c\u00f3digo arbitrario a trav\u00e9s de un ataque de sincronizaci\u00f3n que implica una funci\u00f3n de comparaci\u00f3n HMAC que no se ejecuta en tiempo constante." } ], "id": "CVE-2013-0263", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 4.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-02-08T20:55:01.640", "references": [ { "source": "secalert@redhat.com", "url": "http://lists.opensuse.org/opensuse-updates/2013-03/msg00048.html" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://rack.github.com/" }, { "source": "secalert@redhat.com", "url": "http://rhn.redhat.com/errata/RHSA-2013-0686.html" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/52033" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/52134" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/52774" }, { "source": "secalert@redhat.com", "url": "http://www.debian.org/security/2013/dsa-2783" }, { "source": "secalert@redhat.com", "url": "http://www.osvdb.org/89939" }, { "source": "secalert@redhat.com", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=909071" }, { "source": "secalert@redhat.com", "url": "https://gist.github.com/codahale/f9f3781f7b54985bee94" }, { "source": "secalert@redhat.com", "url": "https://github.com/rack/rack/commit/0cd7e9aa397f8ebb3b8481d67dbac8b4863a7f07" }, { "source": "secalert@redhat.com", "url": "https://github.com/rack/rack/commit/9a81b961457805f6d1a5c275d053068440421e11" }, { "source": "secalert@redhat.com", "url": "https://groups.google.com/d/msg/rack-devel/xKrHVWeNvDM/4ZGA576CnK4J" }, { "source": "secalert@redhat.com", "url": "https://groups.google.com/forum/#%21msg/rack-devel/RnQxm6i13C4/xfakH81yWvgJ" }, { "source": "secalert@redhat.com", "url": "https://groups.google.com/forum/#%21msg/rack-devel/bf937jPZxJM/1s6x95vIhmAJ" }, { "source": "secalert@redhat.com", "url": "https://groups.google.com/forum/#%21msg/rack-devel/hz-liLb9fKE/8jvVWU6xYiYJ" }, { "source": "secalert@redhat.com", "url": "https://groups.google.com/forum/#%21msg/rack-devel/mZsuRonD7G8/DpZIOmMLbOgJ" }, { "source": "secalert@redhat.com", "url": "https://puppet.com/security/cve/cve-2013-0263" }, { "source": "secalert@redhat.com", "url": "https://twitter.com/coda/statuses/299732877745197056" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2013-03/msg00048.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://rack.github.com/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2013-0686.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/52033" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/52134" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/52774" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2013/dsa-2783" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/89939" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=909071" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://gist.github.com/codahale/f9f3781f7b54985bee94" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://github.com/rack/rack/commit/0cd7e9aa397f8ebb3b8481d67dbac8b4863a7f07" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://github.com/rack/rack/commit/9a81b961457805f6d1a5c275d053068440421e11" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://groups.google.com/d/msg/rack-devel/xKrHVWeNvDM/4ZGA576CnK4J" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://groups.google.com/forum/#%21msg/rack-devel/RnQxm6i13C4/xfakH81yWvgJ" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://groups.google.com/forum/#%21msg/rack-devel/bf937jPZxJM/1s6x95vIhmAJ" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://groups.google.com/forum/#%21msg/rack-devel/hz-liLb9fKE/8jvVWU6xYiYJ" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://groups.google.com/forum/#%21msg/rack-devel/mZsuRonD7G8/DpZIOmMLbOgJ" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://puppet.com/security/cve/cve-2013-0263" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://twitter.com/coda/statuses/299732877745197056" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-11-13 23:29
Modified
2024-11-21 03:52
Severity ?
Summary
There is a possible XSS vulnerability in Rack before 2.0.6 and 1.6.11. Carefully crafted requests can impact the data returned by the `scheme` method on `Rack::Request`. Applications that expect the scheme to be limited to 'http' or 'https' and do not escape the return value could be vulnerable to an XSS attack. Note that applications using the normal escaping mechanisms provided by Rails may not impacted, but applications that bypass the escaping mechanisms, or do not use them may be vulnerable.
References
▶ | URL | Tags | |
---|---|---|---|
support@hackerone.com | http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00032.html | ||
support@hackerone.com | http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00016.html | ||
support@hackerone.com | https://groups.google.com/forum/#%21topic/rubyonrails-security/GKsAFT924Ag | ||
support@hackerone.com | https://lists.debian.org/debian-lts-announce/2018/11/msg00022.html | Mailing List, Third Party Advisory | |
support@hackerone.com | https://usn.ubuntu.com/4089-1/ | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00032.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00016.html | ||
af854a3a-2127-422b-91ae-364da2661108 | https://groups.google.com/forum/#%21topic/rubyonrails-security/GKsAFT924Ag | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2018/11/msg00022.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/4089-1/ |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
rack_project | rack | * | |
rack_project | rack | * | |
debian | debian_linux | 8.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rack_project:rack:*:*:*:*:*:*:*:*", "matchCriteriaId": "88141B61-D802-4C96-B46D-92A2D808A528", "versionEndExcluding": "1.6.11", "versionStartIncluding": "1.6.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:rack_project:rack:*:*:*:*:*:*:*:*", "matchCriteriaId": "854E2437-A12B-4B29-9786-C78DF3204A61", "versionEndExcluding": "2.0.6", "versionStartIncluding": "2.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "There is a possible XSS vulnerability in Rack before 2.0.6 and 1.6.11. Carefully crafted requests can impact the data returned by the `scheme` method on `Rack::Request`. Applications that expect the scheme to be limited to \u0027http\u0027 or \u0027https\u0027 and do not escape the return value could be vulnerable to an XSS attack. Note that applications using the normal escaping mechanisms provided by Rails may not impacted, but applications that bypass the escaping mechanisms, or do not use them may be vulnerable." }, { "lang": "es", "value": "Hay una posible vulnerabilidad Cross-Site Scripting (XSS) en Rack en versiones anteriores a la 2.0.6 y la 1.6.11. Las peticiones cuidadosamente manipuladas pueden provocar un impacto en los datos devueltos por el m\u00e9todo \"scheme\" en \"Rack::Request\". Las aplicaciones que esperan que el esquema est\u00e9 limitado a \"http\" o \"https\" y que no escapan el valor de retorno podr\u00edan ser vulnerables a un ataque Cross-Site Scripting (XSS). N\u00f3tese que las aplicaciones que emplean los mecanismos de escape normales proporcionados por Rails podr\u00edan no haberse visto impactados, pero las aplicaciones que omiten los mecanismos de escape o que no los emplean podr\u00edan ser vulnerables." } ], "id": "CVE-2018-16471", "lastModified": "2024-11-21T03:52:49.253", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-11-13T23:29:00.310", "references": [ { "source": "support@hackerone.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00032.html" }, { "source": "support@hackerone.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00016.html" }, { "source": "support@hackerone.com", "url": "https://groups.google.com/forum/#%21topic/rubyonrails-security/GKsAFT924Ag" }, { "source": "support@hackerone.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2018/11/msg00022.html" }, { "source": "support@hackerone.com", "url": "https://usn.ubuntu.com/4089-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00032.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00016.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://groups.google.com/forum/#%21topic/rubyonrails-security/GKsAFT924Ag" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2018/11/msg00022.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://usn.ubuntu.com/4089-1/" } ], "sourceIdentifier": "support@hackerone.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "support@hackerone.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-12-05 22:15
Modified
2024-11-21 07:02
Severity ?
Summary
A sequence injection vulnerability exists in Rack <2.0.9.1, <2.1.4.1 and <2.2.3.1 which could allow is a possible shell escape in the Lint and CommonLogger components of Rack.
References
▶ | URL | Tags | |
---|---|---|---|
support@hackerone.com | https://discuss.rubyonrails.org/t/cve-2022-30123-possible-shell-escape-sequence-injection-vulnerability-in-rack/80728 | Third Party Advisory | |
support@hackerone.com | https://security.gentoo.org/glsa/202310-18 | Third Party Advisory | |
support@hackerone.com | https://security.netapp.com/advisory/ntap-20231208-0011/ | ||
support@hackerone.com | https://www.debian.org/security/2023/dsa-5530 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://discuss.rubyonrails.org/t/cve-2022-30123-possible-shell-escape-sequence-injection-vulnerability-in-rack/80728 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.gentoo.org/glsa/202310-18 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20231208-0011/ | ||
af854a3a-2127-422b-91ae-364da2661108 | https://www.debian.org/security/2023/dsa-5530 | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
rack_project | rack | * | |
rack_project | rack | * | |
rack_project | rack | * | |
debian | debian_linux | 11.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rack_project:rack:*:*:*:*:*:*:*:*", "matchCriteriaId": "47D52179-BB26-40C6-95F0-4466A962CF91", "versionEndExcluding": "2.0.9.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:rack_project:rack:*:*:*:*:*:*:*:*", "matchCriteriaId": "32E774AF-E7BB-45EB-B5E4-66F8F5D36285", "versionEndExcluding": "2.1.4.1", "versionStartIncluding": "2.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:rack_project:rack:*:*:*:*:*:*:*:*", "matchCriteriaId": "6145EE1D-85D5-4744-BA51-88EC52FF2891", "versionEndExcluding": "2.2.3.1", "versionStartIncluding": "2.2.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A sequence injection vulnerability exists in Rack \u003c2.0.9.1, \u003c2.1.4.1 and \u003c2.2.3.1 which could allow is a possible shell escape in the Lint and CommonLogger components of Rack." }, { "lang": "es", "value": "Existe una vulnerabilidad de inyecci\u00f3n de secuencia en Rack \u0026lt;2.0.9.1, \u0026lt;2.1.4.1 y \u0026lt;2.2.3.1 que podr\u00eda permitir un posible escape de shell en los componentes Lint y CommonLogger de Rack." } ], "id": "CVE-2022-30123", "lastModified": "2024-11-21T07:02:12.290", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 10.0, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 6.0, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-12-05T22:15:10.280", "references": [ { "source": "support@hackerone.com", "tags": [ "Third Party Advisory" ], "url": "https://discuss.rubyonrails.org/t/cve-2022-30123-possible-shell-escape-sequence-injection-vulnerability-in-rack/80728" }, { "source": "support@hackerone.com", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202310-18" }, { "source": "support@hackerone.com", "url": "https://security.netapp.com/advisory/ntap-20231208-0011/" }, { "source": "support@hackerone.com", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2023/dsa-5530" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://discuss.rubyonrails.org/t/cve-2022-30123-possible-shell-escape-sequence-injection-vulnerability-in-rack/80728" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202310-18" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.netapp.com/advisory/ntap-20231208-0011/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2023/dsa-5530" } ], "sourceIdentifier": "support@hackerone.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-150" } ], "source": "support@hackerone.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2013-03-01 05:40
Modified
2025-04-11 00:51
Severity ?
Summary
multipart/parser.rb in Rack 1.3.x before 1.3.8 and 1.4.x before 1.4.3 allows remote attackers to cause a denial of service (memory consumption and out-of-memory error) via a long string in a Multipart HTTP packet.
References
▶ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | http://lists.opensuse.org/opensuse-updates/2013-03/msg00048.html | ||
secalert@redhat.com | http://rack.github.com/ | ||
secalert@redhat.com | http://rhn.redhat.com/errata/RHSA-2013-0544.html | ||
secalert@redhat.com | http://rhn.redhat.com/errata/RHSA-2013-0548.html | ||
secalert@redhat.com | http://www.debian.org/security/2013/dsa-2783 | ||
secalert@redhat.com | https://bugzilla.redhat.com/show_bug.cgi?id=895282 | ||
secalert@redhat.com | https://github.com/rack/rack/commit/548b9af2dc0059f4c0c19728624448d84de450ff | ||
secalert@redhat.com | https://github.com/rack/rack/commit/f95113402b7239f225282806673e1b6424522b18 | ||
secalert@redhat.com | https://groups.google.com/forum/#%21topic/rack-devel/-MWPHDeGWtI | ||
secalert@redhat.com | https://groups.google.com/forum/#%21topic/rack-devel/7ZKPNAjgRSs | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-updates/2013-03/msg00048.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://rack.github.com/ | ||
af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2013-0544.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2013-0548.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2013/dsa-2783 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=895282 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/rack/rack/commit/548b9af2dc0059f4c0c19728624448d84de450ff | ||
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/rack/rack/commit/f95113402b7239f225282806673e1b6424522b18 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://groups.google.com/forum/#%21topic/rack-devel/-MWPHDeGWtI | ||
af854a3a-2127-422b-91ae-364da2661108 | https://groups.google.com/forum/#%21topic/rack-devel/7ZKPNAjgRSs |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
rack_project | rack | 1.3.0 | |
rack_project | rack | 1.3.1 | |
rack_project | rack | 1.3.2 | |
rack_project | rack | 1.3.3 | |
rack_project | rack | 1.3.4 | |
rack_project | rack | 1.3.5 | |
rack_project | rack | 1.3.6 | |
rack_project | rack | 1.3.7 | |
rack_project | rack | 1.4.0 | |
rack_project | rack | 1.4.1 | |
rack_project | rack | 1.4.2 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rack_project:rack:1.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "98CBCA07-8EEC-49D0-8C17-7887ABB63ED6", "vulnerable": true }, { "criteria": "cpe:2.3:a:rack_project:rack:1.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "93B65658-8E1B-4832-822A-1C3770B33BB9", "vulnerable": true }, { "criteria": "cpe:2.3:a:rack_project:rack:1.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "9E9E3412-6D9C-46FC-806E-0E0D310D4DDE", "vulnerable": true }, { "criteria": "cpe:2.3:a:rack_project:rack:1.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "10A95FAF-3314-4F3F-8619-DAED41648AE3", "vulnerable": true }, { "criteria": "cpe:2.3:a:rack_project:rack:1.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "00901558-9028-4BDF-AFE6-502DF2632069", "vulnerable": true }, { "criteria": "cpe:2.3:a:rack_project:rack:1.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "5A8CBC63-DBA8-4A4E-87D7-5B891CDF7091", "vulnerable": true }, { "criteria": "cpe:2.3:a:rack_project:rack:1.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "8F6A8485-8F4B-42E8-81ED-84CE5CE8E27D", "vulnerable": true }, { "criteria": "cpe:2.3:a:rack_project:rack:1.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "FBEE2AAF-1575-44F7-9B1B-87504E0425E0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rack_project:rack:1.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "2A3DD73E-6BD4-4C18-A4B8-AFA6860A4585", "vulnerable": true }, { "criteria": "cpe:2.3:a:rack_project:rack:1.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "95E3FF6F-58C3-4491-BBD1-C4C13287A07D", "vulnerable": true }, { "criteria": "cpe:2.3:a:rack_project:rack:1.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "C04A5634-62C7-4B01-B644-06A6A1D5A828", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "multipart/parser.rb in Rack 1.3.x before 1.3.8 and 1.4.x before 1.4.3 allows remote attackers to cause a denial of service (memory consumption and out-of-memory error) via a long string in a Multipart HTTP packet." }, { "lang": "es", "value": "multipart/parser.rb de Rack v1.3.x antes de v1.3.8 y v1.4.x antes de v1.4.3 permite a atacantes remotos causar una denegaci\u00f3n de servicios (consumo de memoria y accesos fuera de rango) usando un long string en un paquete Multipart HTTP." } ], "id": "CVE-2013-0183", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-03-01T05:40:17.037", "references": [ { "source": "secalert@redhat.com", "url": "http://lists.opensuse.org/opensuse-updates/2013-03/msg00048.html" }, { "source": "secalert@redhat.com", "url": "http://rack.github.com/" }, { "source": "secalert@redhat.com", "url": "http://rhn.redhat.com/errata/RHSA-2013-0544.html" }, { "source": "secalert@redhat.com", "url": "http://rhn.redhat.com/errata/RHSA-2013-0548.html" }, { "source": "secalert@redhat.com", "url": "http://www.debian.org/security/2013/dsa-2783" }, { "source": "secalert@redhat.com", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=895282" }, { "source": "secalert@redhat.com", "url": "https://github.com/rack/rack/commit/548b9af2dc0059f4c0c19728624448d84de450ff" }, { "source": "secalert@redhat.com", "url": "https://github.com/rack/rack/commit/f95113402b7239f225282806673e1b6424522b18" }, { "source": "secalert@redhat.com", "url": "https://groups.google.com/forum/#%21topic/rack-devel/-MWPHDeGWtI" }, { "source": "secalert@redhat.com", "url": "https://groups.google.com/forum/#%21topic/rack-devel/7ZKPNAjgRSs" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2013-03/msg00048.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rack.github.com/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2013-0544.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2013-0548.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2013/dsa-2783" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=895282" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://github.com/rack/rack/commit/548b9af2dc0059f4c0c19728624448d84de450ff" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://github.com/rack/rack/commit/f95113402b7239f225282806673e1b6424522b18" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://groups.google.com/forum/#%21topic/rack-devel/-MWPHDeGWtI" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://groups.google.com/forum/#%21topic/rack-devel/7ZKPNAjgRSs" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2013-02-08 20:55
Modified
2025-04-11 00:51
Severity ?
Summary
rack/file.rb (Rack::File) in Rack 1.5.x before 1.5.2 and 1.4.x before 1.4.5 allows attackers to access arbitrary files outside the intended root directory via a crafted PATH_INFO environment variable, probably a directory traversal vulnerability that is remotely exploitable, aka "symlink path traversals."
References
▶ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | http://lists.opensuse.org/opensuse-updates/2013-03/msg00048.html | ||
secalert@redhat.com | http://rack.github.com/ | ||
secalert@redhat.com | http://secunia.com/advisories/52033 | Vendor Advisory | |
secalert@redhat.com | https://bugzilla.redhat.com/show_bug.cgi?id=909071 | ||
secalert@redhat.com | https://bugzilla.redhat.com/show_bug.cgi?id=909072 | ||
secalert@redhat.com | https://gist.github.com/rentzsch/4736940 | ||
secalert@redhat.com | https://github.com/rack/rack/blob/master/lib/rack/file.rb#L56 | ||
secalert@redhat.com | https://github.com/rack/rack/commit/6f237e4c9fab649d3750482514f0fde76c56ab30 | ||
secalert@redhat.com | https://groups.google.com/forum/#%21msg/rack-devel/bf937jPZxJM/1s6x95vIhmAJ | ||
secalert@redhat.com | https://groups.google.com/forum/#%21msg/rack-devel/mZsuRonD7G8/DpZIOmMLbOgJ | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-updates/2013-03/msg00048.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://rack.github.com/ | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/52033 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=909071 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=909072 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://gist.github.com/rentzsch/4736940 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/rack/rack/blob/master/lib/rack/file.rb#L56 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/rack/rack/commit/6f237e4c9fab649d3750482514f0fde76c56ab30 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://groups.google.com/forum/#%21msg/rack-devel/bf937jPZxJM/1s6x95vIhmAJ | ||
af854a3a-2127-422b-91ae-364da2661108 | https://groups.google.com/forum/#%21msg/rack-devel/mZsuRonD7G8/DpZIOmMLbOgJ |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
rack_project | rack | 1.4.0 | |
rack_project | rack | 1.4.1 | |
rack_project | rack | 1.4.2 | |
rack_project | rack | 1.4.3 | |
rack_project | rack | 1.4.4 | |
rack_project | rack | 1.5.0 | |
rack_project | rack | 1.5.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rack_project:rack:1.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "2A3DD73E-6BD4-4C18-A4B8-AFA6860A4585", "vulnerable": true }, { "criteria": "cpe:2.3:a:rack_project:rack:1.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "95E3FF6F-58C3-4491-BBD1-C4C13287A07D", "vulnerable": true }, { "criteria": "cpe:2.3:a:rack_project:rack:1.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "C04A5634-62C7-4B01-B644-06A6A1D5A828", "vulnerable": true }, { "criteria": "cpe:2.3:a:rack_project:rack:1.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "290B1557-33F7-4717-B3C4-081FECF71BD5", "vulnerable": true }, { "criteria": "cpe:2.3:a:rack_project:rack:1.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "FAB99ED2-4E74-4652-9A04-A46436F151E6", "vulnerable": true }, { "criteria": "cpe:2.3:a:rack_project:rack:1.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "F55AF59F-CA0C-4F48-81BF-C9316672886D", "vulnerable": true }, { "criteria": "cpe:2.3:a:rack_project:rack:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "8DA5F2A1-86CC-4836-A75F-9B275884683A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "rack/file.rb (Rack::File) in Rack 1.5.x before 1.5.2 and 1.4.x before 1.4.5 allows attackers to access arbitrary files outside the intended root directory via a crafted PATH_INFO environment variable, probably a directory traversal vulnerability that is remotely exploitable, aka \"symlink path traversals.\"" }, { "lang": "es", "value": "rack/file.rb (Rack::File) en Rack v1.5.x anterior a v1.5.2 y v1.4.x anterior a v1.4.5 permite a atacantes acceder a ficheros arbitrarios fuera del directorio raiz mediante una variable de entorno PATH_INFO especialmente dise\u00f1ada, posiblemente una vulnerabilidad de salto de directorio remotamente explotable, tambi\u00e9n conocido como \"salto de directorio symlink\"." } ], "id": "CVE-2013-0262", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-02-08T20:55:01.577", "references": [ { "source": "secalert@redhat.com", "url": "http://lists.opensuse.org/opensuse-updates/2013-03/msg00048.html" }, { "source": "secalert@redhat.com", "url": "http://rack.github.com/" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/52033" }, { "source": "secalert@redhat.com", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=909071" }, { "source": "secalert@redhat.com", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=909072" }, { "source": "secalert@redhat.com", "url": "https://gist.github.com/rentzsch/4736940" }, { "source": "secalert@redhat.com", "url": "https://github.com/rack/rack/blob/master/lib/rack/file.rb#L56" }, { "source": "secalert@redhat.com", "url": "https://github.com/rack/rack/commit/6f237e4c9fab649d3750482514f0fde76c56ab30" }, { "source": "secalert@redhat.com", "url": "https://groups.google.com/forum/#%21msg/rack-devel/bf937jPZxJM/1s6x95vIhmAJ" }, { "source": "secalert@redhat.com", "url": "https://groups.google.com/forum/#%21msg/rack-devel/mZsuRonD7G8/DpZIOmMLbOgJ" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2013-03/msg00048.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rack.github.com/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/52033" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=909071" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=909072" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://gist.github.com/rentzsch/4736940" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://github.com/rack/rack/blob/master/lib/rack/file.rb#L56" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://github.com/rack/rack/commit/6f237e4c9fab649d3750482514f0fde76c56ab30" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://groups.google.com/forum/#%21msg/rack-devel/bf937jPZxJM/1s6x95vIhmAJ" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://groups.google.com/forum/#%21msg/rack-devel/mZsuRonD7G8/DpZIOmMLbOgJ" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-22" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }