-
-
Notifications
You must be signed in to change notification settings - Fork 221
/
Copy pathCVE-2022-44571.yml
32 lines (27 loc) · 1.01 KB
/
CVE-2022-44571.yml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
---
gem: rack
cve: 2022-44571
ghsa: 93pm-5p5f-3ghx
url: https://github.com/rack/rack/releases/tag/v3.0.4.1
title: Denial of Service Vulnerability in Rack Content-Disposition parsing
date: 2023-01-18
description: |
There is a denial of service vulnerability in the Content-Disposition parsing
component of Rack. This vulnerability has been assigned the CVE identifier
CVE-2022-44571.
Versions Affected: >= 2.0.0
Not affected: None.
Fixed Versions: 2.0.9.2, 2.1.4.2, 2.2.6.1, 3.0.4.1
# Impact
Carefully crafted input can cause Content-Disposition header parsing in Rack
to take an unexpected amount of time, possibly resulting in a denial of
service attack vector. This header is used typically used in multipart
parsing. Any applications that parse multipart posts using Rack (virtually
all Rails applications) are impacted.
# Workarounds
There are no feasible workarounds for this issue.
patched_versions:
- "~> 2.0.9, >= 2.0.9.2"
- "~> 2.1.4, >= 2.1.4.2"
- "~> 2.2.6, >= 2.2.6.1"
- ">= 3.0.4.1"