Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2025-59830

Опубликовано: 25 сент. 2025
Источник: debian
EPSS Низкий

Описание

Rack is a modular Ruby web server interface. Prior to version 2.2.18, Rack::QueryParser enforces its params_limit only for parameters separated by &, while still splitting on both & and ;. As a result, attackers could use ; separators to bypass the parameter count limit and submit more parameters than intended. Applications or middleware that directly invoke Rack::QueryParser with its default configuration (no explicit delimiter) could be exposed to increased CPU and memory consumption. This can be abused as a limited denial-of-service vector. This issue has been patched in version 2.2.18.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
ruby-rackfixed3.0.8-2package
ruby-rackfixed2.2.20-0+deb12u1bookwormpackage

Примечания

  • https://github.com/rack/rack/security/advisories/GHSA-625h-95r8-8xpm

  • Fixed by: https://github.com/rack/rack/commit/54e4ffdd5affebcb0c015cc6ae74635c0831ed71 (v2.2.18)

  • Rack > 3 is not affected as semicolons are not considered parameter separators in Rack 3.

  • Mark the first version in 3.x series entering unstable as the fixed version.

EPSS

Процентиль: 20%
0.00064
Низкий

Связанные уязвимости

CVSS3: 7.5
ubuntu
2 месяца назад

Rack is a modular Ruby web server interface. Prior to version 2.2.18, Rack::QueryParser enforces its params_limit only for parameters separated by &, while still splitting on both & and ;. As a result, attackers could use ; separators to bypass the parameter count limit and submit more parameters than intended. Applications or middleware that directly invoke Rack::QueryParser with its default configuration (no explicit delimiter) could be exposed to increased CPU and memory consumption. This can be abused as a limited denial-of-service vector. This issue has been patched in version 2.2.18.

CVSS3: 7.5
nvd
2 месяца назад

Rack is a modular Ruby web server interface. Prior to version 2.2.18, Rack::QueryParser enforces its params_limit only for parameters separated by &, while still splitting on both & and ;. As a result, attackers could use ; separators to bypass the parameter count limit and submit more parameters than intended. Applications or middleware that directly invoke Rack::QueryParser with its default configuration (no explicit delimiter) could be exposed to increased CPU and memory consumption. This can be abused as a limited denial-of-service vector. This issue has been patched in version 2.2.18.

CVSS3: 7.5
redos
около 2 месяцев назад

Уязвимость rubygem-rack

CVSS3: 7.5
github
2 месяца назад

Rack has an unsafe default in Rack::QueryParser allows params_limit bypass via semicolon-separated parameters

CVSS3: 7.5
fstec
2 месяца назад

Уязвимость функции QueryParser() интерфейса модуля Rack интерпретатора языка программирования Ruby, позволяющая нарушителю вызвать отказ в обслуживании

EPSS

Процентиль: 20%
0.00064
Низкий