A possible denial of service vulnerability exists in Rack <2.0.9.1, <2.1.4.1 and <2.2.3.1 in the multipart parsing component of Rack.
The product uses a regular expression with an inefficient, possibly exponential worst-case computational complexity that consumes excessive CPU cycles.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Rack | Rack_project | 1.2 (including) | 2.0.9.1 (excluding) |
Rack | Rack_project | 2.1.0 (including) | 2.1.4.1 (excluding) |
Rack | Rack_project | 2.2.0 (including) | 2.2.3.1 (excluding) |
Red Hat Gluster Storage 3.5 for RHEL 7 | RedHat | rubygem-rack-0:2.2.4-1.el7rhgs | * |
Red Hat Satellite 6.11 for RHEL 7 | RedHat | tfm-rubygem-rack-0:2.2.3.1-1.el7sat | * |
Red Hat Satellite 6.11 for RHEL 7 | RedHat | tfm-rubygem-rack-0:2.2.3.1-1.el7sat | * |
Red Hat Satellite 6.11 for RHEL 8 | RedHat | rubygem-rack-0:2.2.3.1-1.el8sat | * |
Red Hat Satellite 6.11 for RHEL 8 | RedHat | rubygem-rack-0:2.2.3.1-1.el8sat | * |
Ruby-rack | Ubuntu | bionic | * |
Ruby-rack | Ubuntu | esm-apps/bionic | * |
Ruby-rack | Ubuntu | esm-apps/focal | * |
Ruby-rack | Ubuntu | esm-apps/jammy | * |
Ruby-rack | Ubuntu | esm-apps/xenial | * |
Ruby-rack | Ubuntu | focal | * |
Ruby-rack | Ubuntu | impish | * |
Ruby-rack | Ubuntu | jammy | * |
Ruby-rack | Ubuntu | trusty/esm | * |
Ruby-rack | Ubuntu | upstream | * |
Ruby-rack | Ubuntu | xenial | * |
Attackers can create crafted inputs that
intentionally cause the regular expression to use
excessive backtracking in a way that causes the CPU
consumption to spike.