First published: Fri May 27 2022(Updated: )
A denial of service flaw was found in ruby-rack. An attacker crafting multipart POST requests can cause Rack's multipart parser to take much longer than expected, leading to a denial of service.
Credit: support@hackerone.com support@hackerone.com support@hackerone.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/rubygem-rack | <0:2.2.4-1.el7 | 0:2.2.4-1.el7 |
redhat/tfm-rubygem-rack | <0:2.2.3.1-1.el7 | 0:2.2.3.1-1.el7 |
redhat/rubygem-rack | <0:2.2.3.1-1.el8 | 0:2.2.3.1-1.el8 |
Rack Project Rack | >=1.2<2.0.9.1 | |
Rack Project Rack | >=2.1.0<2.1.4.1 | |
Rack Project Rack | >=2.2.0<2.2.3.1 | |
rubygems/rack | >=2.2<=2.2.3.0 | 2.2.3.1 |
rubygems/rack | >=2.1<=2.1.4.0 | 2.1.4.1 |
rubygems/rack | >=1.2<=2.0.9.0 | 2.0.9.1 |
redhat/rubygem-rack | <2.0.9.1 | 2.0.9.1 |
redhat/rubygem-rack | <2.1.4.1 | 2.1.4.1 |
redhat/rubygem-rack | <2.2.3.1 | 2.2.3.1 |
Debian Debian Linux | =11.0 | |
debian/ruby-rack | 2.1.4-3+deb11u2 2.2.6.4-1+deb12u1 2.2.7-1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-30122 is a denial of service vulnerability in the multipart parsing component of Rack.
Versions >= 1.2 of Rack are affected by CVE-2022-30122.
To fix CVE-2022-30122, update to the fixed versions: 2.0.9.1, 2.1.4.1, or 2.2.3.1 of Rack.
CVE-2022-30122 has a severity rating of 7.5 (High).
You can find more information about CVE-2022-30122 in the references provided: [GitHub Advisory](https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2022-30122.yml), [Red Hat Bugzilla](https://bugzilla.redhat.com/show_bug.cgi/show_bug.cgi?id=2099520), [Red Hat Security Advisory](https://access.redhat.com/errata/RHSA-2022:7242).