mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-19 17:31:42 +00:00
79 lines
2.7 KiB
JSON
79 lines
2.7 KiB
JSON
![]() |
{
|
||
|
"id": "CVE-2024-26146",
|
||
|
"sourceIdentifier": "security-advisories@github.com",
|
||
|
"published": "2024-02-29T00:15:51.597",
|
||
|
"lastModified": "2024-02-29T00:15:51.597",
|
||
|
"vulnStatus": "Received",
|
||
|
"descriptions": [
|
||
|
{
|
||
|
"lang": "en",
|
||
|
"value": "Rack is a modular Ruby web server interface. Carefully crafted headers can cause header parsing in Rack to take longer than expected resulting in a possible denial of service issue. Accept and Forwarded headers are impacted. Ruby 3.2 has mitigations for this problem, so Rack applications using Ruby 3.2 or newer are unaffected. This vulnerability is fixed in 2.0.9.4, 2.1.4.4, 2.2.8.1, and 3.0.9.1.\n"
|
||
|
}
|
||
|
],
|
||
|
"metrics": {
|
||
|
"cvssMetricV31": [
|
||
|
{
|
||
|
"source": "security-advisories@github.com",
|
||
|
"type": "Secondary",
|
||
|
"cvssData": {
|
||
|
"version": "3.1",
|
||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
|
||
|
"attackVector": "NETWORK",
|
||
|
"attackComplexity": "LOW",
|
||
|
"privilegesRequired": "NONE",
|
||
|
"userInteraction": "NONE",
|
||
|
"scope": "UNCHANGED",
|
||
|
"confidentialityImpact": "NONE",
|
||
|
"integrityImpact": "NONE",
|
||
|
"availabilityImpact": "LOW",
|
||
|
"baseScore": 5.3,
|
||
|
"baseSeverity": "MEDIUM"
|
||
|
},
|
||
|
"exploitabilityScore": 3.9,
|
||
|
"impactScore": 1.4
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
"weaknesses": [
|
||
|
{
|
||
|
"source": "security-advisories@github.com",
|
||
|
"type": "Secondary",
|
||
|
"description": [
|
||
|
{
|
||
|
"lang": "en",
|
||
|
"value": "CWE-1333"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
],
|
||
|
"references": [
|
||
|
{
|
||
|
"url": "https://discuss.rubyonrails.org/t/possible-denial-of-service-vulnerability-in-rack-header-parsing/84942",
|
||
|
"source": "security-advisories@github.com"
|
||
|
},
|
||
|
{
|
||
|
"url": "https://github.com/rack/rack/commit/30b8e39a578b25d4bdcc082c1c52c6f164b59716",
|
||
|
"source": "security-advisories@github.com"
|
||
|
},
|
||
|
{
|
||
|
"url": "https://github.com/rack/rack/commit/6c5d90bdcec0949f7ba06db62fb740dab394b582",
|
||
|
"source": "security-advisories@github.com"
|
||
|
},
|
||
|
{
|
||
|
"url": "https://github.com/rack/rack/commit/a227cd793778c7c3a827d32808058571569cda6f",
|
||
|
"source": "security-advisories@github.com"
|
||
|
},
|
||
|
{
|
||
|
"url": "https://github.com/rack/rack/commit/e4c117749ba24a66f8ec5a08eddf68deeb425ccd",
|
||
|
"source": "security-advisories@github.com"
|
||
|
},
|
||
|
{
|
||
|
"url": "https://github.com/rack/rack/security/advisories/GHSA-54rr-7fvw-6x8f",
|
||
|
"source": "security-advisories@github.com"
|
||
|
},
|
||
|
{
|
||
|
"url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2024-26146.yml",
|
||
|
"source": "security-advisories@github.com"
|
||
|
}
|
||
|
]
|
||
|
}
|