First published: Wed Jan 18 2023(Updated: )
A denial of service vulnerability in the Range header parsing component of Rack >= 1.5.0. A Carefully crafted input can cause the Range header parsing component in Rack to take an unexpected amount of time, possibly resulting in a denial of service attack vector. Any applications that deal with Range requests (such as streaming applications, or applications that serve files) may be impacted.
Credit: support@hackerone.com support@hackerone.com support@hackerone.com
Affected Software | Affected Version | How to fix |
---|---|---|
Rack Project Rack | >=1.5.0<2.0.9.2 | |
Rack Project Rack | >=2.1.0<2.1.4.2 | |
Rack Project Rack | >=2.2.0<2.2.6.1 | |
Rack Project Rack | >=3.0.0<3.0.4.1 | |
rubygems/rack | >=3.0.0.0<3.0.4.1 | 3.0.4.1 |
rubygems/rack | >=2.2.0.0<2.2.6.2 | 2.2.6.2 |
rubygems/rack | >=2.1.0.0<2.1.4.2 | 2.1.4.2 |
rubygems/rack | >=1.5.0<2.0.9.2 | 2.0.9.2 |
redhat/rubygem-rack | <2.0.9.2 | 2.0.9.2 |
redhat/rubygem-rack | <2.1.4.2 | 2.1.4.2 |
redhat/rubygem-rack | <2.2.6.1 | 2.2.6.1 |
redhat/rubygem-rack | <3.0.4.1 | 3.0.4.1 |
debian/ruby-rack | 2.1.4-3+deb11u2 2.2.6.4-1+deb12u1 2.2.7-1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-44570 is a denial of service vulnerability in the Range header parsing component of Rack.
Versions of Rack >= 1.5.0 are affected by CVE-2022-44570.
CVE-2022-44570 has a severity rating of 7.5 (high).
To fix CVE-2022-44570, update to the fixed versions: 2.0.9.2, 2.1.4.2, 2.2.6.2, 3.0.0.1
You can find more information about CVE-2022-44570 at the following references: [Link 1](https://discuss.rubyonrails.org/t/cve-2022-44570-possible-denial-of-service-vulnerability-in-racks-range-header-parsing/82125), [Link 2](https://www.debian.org/security/2023/dsa-5530), [Link 3](https://github.com/rack/rack/commit/52721ae0b730e3920ad5375dfd5a3ea9b4f9e359)