Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-49007

Опубликовано: 04 июн. 2025
Источник: redhat
CVSS3: 7.5
EPSS Низкий

Описание

Rack is a modular Ruby web server interface. Starting in version 3.1.0 and prior to version 3.1.16, there is a denial of service vulnerability in the Content-Disposition parsing component of Rack. This is very similar to the previous security issue CVE-2022-44571. Carefully crafted input can cause Content-Disposition header parsing in Rack to take an unexpected amount of time, possibly resulting in a denial of service attack vector. This header is used typically used in multipart parsing. Any applications that parse multipart posts using Rack (virtually all Rails applications) are impacted. Version 3.1.16 contains a patch for the vulnerability.

A flaw was found in Rack. The Content-Disposition parsing component exhibits a denial of service vulnerability due to improper handling of specially crafted input, allowing a remote attacker to trigger a crash. This vulnerability is triggered by processing a malicious Content-Disposition header. Consequently, a remote attacker can cause the Rack web server interface to become unavailable.

Отчет

This vulnerability in Rack is considered Important rather than Moderate due to its impact on core request handling and application availability. The flaw lies in the inefficient parsing of the Content-Disposition header, commonly used in multipart form submissions. An attacker can exploit this by sending specially crafted input that causes the parser to consume excessive CPU resources, leading to a denial-of-service (DoS) condition. Since virtually all Rails applications and many other Ruby web apps rely on Rack for multipart parsing, the attack surface is widespread and affects production systems at the framework level. The attack does not require authentication and can be triggered with a single malicious request, making it low-cost but high-impact. Furthermore, because the vulnerability is exploited during early request processing, it can bypass typical application-level protections. This combination of broad exposure, low complexity, and high disruption potential elevates the severity to important.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Logging Subsystem for Red Hat OpenShiftopenshift-logging/fluentd-rhel8Not affected
Logging Subsystem for Red Hat OpenShiftopenshift-logging/fluentd-rhel9Not affected
Red Hat Enterprise Linux 10pcsNot affected
Red Hat Enterprise Linux 10rhel10/ruby-33Not affected
Red Hat Enterprise Linux 10ubi10/ruby-33Not affected
Red Hat Enterprise Linux 7pcsNot affected
Red Hat Enterprise Linux 8pcsAffected
Red Hat Enterprise Linux 9pcsNot affected
Red Hat Enterprise Linux 9rhel9/ruby-30Not affected
Red Hat Enterprise Linux 9rhel9/ruby-31Not affected

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-770
https://bugzilla.redhat.com/show_bug.cgi?id=2370346rack: rubygem-rack: Rack Content-Disposition Denial of Service

EPSS

Процентиль: 19%
0.0006
Низкий

7.5 High

CVSS3

Связанные уязвимости

ubuntu
14 дней назад

Rack is a modular Ruby web server interface. Starting in version 3.1.0 and prior to version 3.1.16, there is a denial of service vulnerability in the Content-Disposition parsing component of Rack. This is very similar to the previous security issue CVE-2022-44571. Carefully crafted input can cause Content-Disposition header parsing in Rack to take an unexpected amount of time, possibly resulting in a denial of service attack vector. This header is used typically used in multipart parsing. Any applications that parse multipart posts using Rack (virtually all Rails applications) are impacted. Version 3.1.16 contains a patch for the vulnerability.

nvd
14 дней назад

Rack is a modular Ruby web server interface. Starting in version 3.1.0 and prior to version 3.1.16, there is a denial of service vulnerability in the Content-Disposition parsing component of Rack. This is very similar to the previous security issue CVE-2022-44571. Carefully crafted input can cause Content-Disposition header parsing in Rack to take an unexpected amount of time, possibly resulting in a denial of service attack vector. This header is used typically used in multipart parsing. Any applications that parse multipart posts using Rack (virtually all Rails applications) are impacted. Version 3.1.16 contains a patch for the vulnerability.

debian
14 дней назад

Rack is a modular Ruby web server interface. Starting in version 3.1.0 ...

github
14 дней назад

ReDoS Vulnerability in Rack::Multipart handle_mime_head

EPSS

Процентиль: 19%
0.0006
Низкий

7.5 High

CVSS3