cve/2024/CVE-2024-35231.md

18 lines
1.0 KiB
Markdown
Raw Normal View History

2024-05-28 08:49:17 +00:00
### [CVE-2024-35231](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35231)
![](https://img.shields.io/static/v1?label=Product&message=rack-contrib&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20%3C%202.5.0%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling&color=brighgreen)
### Description
rack-contrib provides contributed rack middleware and utilities for Rack, a Ruby web server interface. Versions of rack-contrib prior to 2.5.0 are vulnerable to denial of service due to the fact that the user controlled data `profiler_runs` was not constrained to any limitation. This would lead to allocating resources on the server side with no limitation and a potential denial of service by remotely user-controlled data. Version 2.5.0 contains a patch for the issue.
### POC
#### Reference
2024-06-08 09:32:58 +00:00
- https://github.com/rack/rack-contrib/security/advisories/GHSA-8c8q-2xw3-j869
2024-05-28 08:49:17 +00:00
#### Github
- https://github.com/Sim4n6/Sim4n6