mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
138 lines
5.7 KiB
JSON
138 lines
5.7 KiB
JSON
{
|
|
"data_version": "4.0",
|
|
"data_type": "CVE",
|
|
"data_format": "MITRE",
|
|
"CVE_data_meta": {
|
|
"ID": "CVE-2024-26146",
|
|
"ASSIGNER": "security-advisories@github.com",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Rack is a modular Ruby web server interface. Carefully crafted headers can cause header parsing in Rack to take longer than expected resulting in a possible denial of service issue. Accept and Forwarded headers are impacted. Ruby 3.2 has mitigations for this problem, so Rack applications using Ruby 3.2 or newer are unaffected. This vulnerability is fixed in 2.0.9.4, 2.1.4.4, 2.2.8.1, and 3.0.9.1.\n"
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "CWE-1333: Inefficient Regular Expression Complexity",
|
|
"cweId": "CWE-1333"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"vendor_name": "rack",
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "rack",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": ">= 3.0.0, < 3.0.9.1"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": ">= 2.2.0, < 2.2.8.1"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": ">= 2.1.0, < 2.1.4.4"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "< 2.0.9.4"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"url": "https://github.com/rack/rack/security/advisories/GHSA-54rr-7fvw-6x8f",
|
|
"refsource": "MISC",
|
|
"name": "https://github.com/rack/rack/security/advisories/GHSA-54rr-7fvw-6x8f"
|
|
},
|
|
{
|
|
"url": "https://github.com/rack/rack/commit/30b8e39a578b25d4bdcc082c1c52c6f164b59716",
|
|
"refsource": "MISC",
|
|
"name": "https://github.com/rack/rack/commit/30b8e39a578b25d4bdcc082c1c52c6f164b59716"
|
|
},
|
|
{
|
|
"url": "https://github.com/rack/rack/commit/6c5d90bdcec0949f7ba06db62fb740dab394b582",
|
|
"refsource": "MISC",
|
|
"name": "https://github.com/rack/rack/commit/6c5d90bdcec0949f7ba06db62fb740dab394b582"
|
|
},
|
|
{
|
|
"url": "https://github.com/rack/rack/commit/a227cd793778c7c3a827d32808058571569cda6f",
|
|
"refsource": "MISC",
|
|
"name": "https://github.com/rack/rack/commit/a227cd793778c7c3a827d32808058571569cda6f"
|
|
},
|
|
{
|
|
"url": "https://github.com/rack/rack/commit/e4c117749ba24a66f8ec5a08eddf68deeb425ccd",
|
|
"refsource": "MISC",
|
|
"name": "https://github.com/rack/rack/commit/e4c117749ba24a66f8ec5a08eddf68deeb425ccd"
|
|
},
|
|
{
|
|
"url": "https://discuss.rubyonrails.org/t/possible-denial-of-service-vulnerability-in-rack-header-parsing/84942",
|
|
"refsource": "MISC",
|
|
"name": "https://discuss.rubyonrails.org/t/possible-denial-of-service-vulnerability-in-rack-header-parsing/84942"
|
|
},
|
|
{
|
|
"url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2024-26146.yml",
|
|
"refsource": "MISC",
|
|
"name": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2024-26146.yml"
|
|
},
|
|
{
|
|
"url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00022.html",
|
|
"refsource": "MISC",
|
|
"name": "https://lists.debian.org/debian-lts-announce/2024/04/msg00022.html"
|
|
},
|
|
{
|
|
"url": "https://security.netapp.com/advisory/ntap-20240510-0006/",
|
|
"refsource": "MISC",
|
|
"name": "https://security.netapp.com/advisory/ntap-20240510-0006/"
|
|
}
|
|
]
|
|
},
|
|
"source": {
|
|
"advisory": "GHSA-54rr-7fvw-6x8f",
|
|
"discovery": "UNKNOWN"
|
|
},
|
|
"impact": {
|
|
"cvss": [
|
|
{
|
|
"attackComplexity": "LOW",
|
|
"attackVector": "NETWORK",
|
|
"availabilityImpact": "LOW",
|
|
"baseScore": 5.3,
|
|
"baseSeverity": "MEDIUM",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "NONE",
|
|
"privilegesRequired": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"userInteraction": "NONE",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
|
|
"version": "3.1"
|
|
}
|
|
]
|
|
}
|
|
} |