First published: Wed Jan 18 2023(Updated: )
Carefully crafted input can cause Content-Disposition header parsing in Rack to take an unexpected amount of time, possibly resulting in a denial of service attack vector. This header is used typically used in multipart parsing. Any applications that parse multipart posts using Rack (virtually all Rails applications) are impacted.
Credit: support@hackerone.com support@hackerone.com support@hackerone.com
Affected Software | Affected Version | How to fix |
---|---|---|
Rack Project Rack | >=2.0.0<2.0.9.2 | |
Rack Project Rack | >=2.1.0<2.1.4.2 | |
Rack Project Rack | >=2.2.0<2.2.6.1 | |
Rack Project Rack | >=3.0.0.0<3.0.4.1 | |
rubygems/rack | >=3.0.0.0<3.0.4.1 | 3.0.4.1 |
rubygems/rack | >=2.2.0<2.2.6.1 | 2.2.6.1 |
rubygems/rack | >=2.1.0<2.1.4.2 | 2.1.4.2 |
rubygems/rack | >=2.0.0<2.0.9.2 | 2.0.9.2 |
redhat/rubygem-rack | <2.0.9.2 | 2.0.9.2 |
redhat/rubygem-rack | <2.1.4.2 | 2.1.4.2 |
redhat/rubygem-rack | <2.2.6.1 | 2.2.6.1 |
redhat/rubygem-rack | <3.0.4.1 | 3.0.4.1 |
debian/ruby-rack | 2.1.4-3+deb11u2 2.2.6.4-1+deb12u1 2.2.7-1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2022-44571.
The severity of CVE-2022-44571 is high with a severity value of 7.5.
Versions >= 2.0.0 of Rack are affected by CVE-2022-44571.
To fix CVE-2022-44571, update Rack to versions 2.0.9.2, 2.1.4.2, 2.2.6.1, or 3.0.0.1.
You can find more information about CVE-2022-44571 at the following references: [Link 1](https://discuss.rubyonrails.org/t/cve-2022-44571-possible-denial-of-service-vulnerability-in-rack-content-disposition-parsing/82126), [Link 2](https://www.debian.org/security/2023/dsa-5530), [Link 3](https://github.com/rack/rack/commit/4e33ad10bf5f16d25c156f905bcc548e7f787bc3).