CVE Vulnerabilities

CVE-2025-59830

Uncontrolled Resource Consumption

Published: Sep 25, 2025 | Modified: Oct 10, 2025
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
RedHat/V2
RedHat/V3
7.5 MODERATE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

Rack is a modular Ruby web server interface. Prior to version 2.2.18, Rack::QueryParser enforces its params_limit only for parameters separated by &, while still splitting on both & and ;. As a result, attackers could use ; separators to bypass the parameter count limit and submit more parameters than intended. Applications or middleware that directly invoke Rack::QueryParser with its default configuration (no explicit delimiter) could be exposed to increased CPU and memory consumption. This can be abused as a limited denial-of-service vector. This issue has been patched in version 2.2.18.

Weakness

The product does not properly control the allocation and maintenance of a limited resource.

Affected Software

NameVendorStart VersionEnd Version
RackRack*2.2.18 (excluding)
Red Hat Enterprise Linux 10RedHatpcs-0:0.12.0-3.el10_0.3*
Red Hat Enterprise Linux 10RedHatpcs-0:0.12.1-1.el10_1.1*
Red Hat Enterprise Linux 8RedHatpcs-0:0.10.18-2.el8_10.7*
Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update SupportRedHatpcs-0:0.10.8-1.el8_4.8*
Red Hat Enterprise Linux 8.4 Extended Update Support Long-Life Add-OnRedHatpcs-0:0.10.8-1.el8_4.8*
Red Hat Enterprise Linux 8.6 Telecommunications Update ServiceRedHatpcs-0:0.10.12-6.el8_6.10*
Red Hat Enterprise Linux 8.6 Update Services for SAP SolutionsRedHatpcs-0:0.10.12-6.el8_6.10*
Red Hat Enterprise Linux 8.8 Telecommunications Update ServiceRedHatpcs-0:0.10.15-4.el8_8.9*
Red Hat Enterprise Linux 8.8 Update Services for SAP SolutionsRedHatpcs-0:0.10.15-4.el8_8.9*
Red Hat Enterprise Linux 9RedHatpcs-0:0.11.9-2.el9_6.2*
Red Hat Enterprise Linux 9RedHatpcs-0:0.11.10-1.el9_7.1*
Red Hat Enterprise Linux 9.0 Update Services for SAP SolutionsRedHatpcs-0:0.11.1-10.el9_0.9*
Red Hat Enterprise Linux 9.2 Update Services for SAP SolutionsRedHatpcs-0:0.11.4-7.el9_2.6*
Red Hat Enterprise Linux 9.4 Extended Update SupportRedHatpcs-0:0.11.7-2.el9_4.5*
Red Hat Satellite 6.15 for RHEL 8RedHatrubygem-rack-0:2.2.20-1.el8sat*
Red Hat Satellite 6.15 for RHEL 8RedHatrubygem-rack-0:2.2.20-1.el8sat*
Red Hat Satellite 6.16 for RHEL 8RedHatrubygem-rack-0:2.2.20-1.el8sat*
Red Hat Satellite 6.16 for RHEL 8RedHatrubygem-rack-0:2.2.20-1.el8sat*
Red Hat Satellite 6.16 for RHEL 9RedHatrubygem-rack-0:2.2.20-1.el9sat*
Red Hat Satellite 6.16 for RHEL 9RedHatrubygem-rack-0:2.2.20-1.el9sat*
Red Hat Satellite 6.17 for RHEL 9RedHatrubygem-rack-0:2.2.20-1.el9sat*
Red Hat Satellite 6.17 for RHEL 9RedHatrubygem-rack-0:2.2.20-1.el9sat*
Ruby-rackUbuntuesm-apps/bionic*
Ruby-rackUbuntuesm-apps/focal*
Ruby-rackUbuntuesm-apps/jammy*
Ruby-rackUbuntuesm-apps/xenial*
Ruby-rackUbuntuesm-infra-legacy/trusty*
Ruby-rackUbuntujammy*
Ruby-rackUbuntunoble*
Ruby-rackUbuntuplucky*
Ruby-rackUbuntuupstream*

Potential Mitigations

  • Mitigation of resource exhaustion attacks requires that the target system either:

  • The first of these solutions is an issue in itself though, since it may allow attackers to prevent the use of the system by a particular valid user. If the attacker impersonates the valid user, they may be able to prevent the user from accessing the server in question.

  • The second solution is simply difficult to effectively institute – and even when properly done, it does not provide a full solution. It simply makes the attack require more resources on the part of the attacker.

References