cve-2024-26141
Vulnerability from cvelistv5
Published
2024-02-28 23:28
Modified
2024-08-28 17:55
Summary
Possible DoS Vulnerability with Range Header in Rack
References
security-advisories@github.comhttps://discuss.rubyonrails.org/t/possible-dos-vulnerability-with-range-header-in-rack/84944
security-advisories@github.comhttps://github.com/rack/rack/commit/4849132bef471adb21131980df745f4bb84de2d9
security-advisories@github.comhttps://github.com/rack/rack/commit/62457686b26d33a15a254c7768c2076e8e02b48b
security-advisories@github.comhttps://github.com/rack/rack/security/advisories/GHSA-xj5v-6v4g-jfw6
security-advisories@github.comhttps://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2024-26141.yml
security-advisories@github.comhttps://lists.debian.org/debian-lts-announce/2024/04/msg00022.html
security-advisories@github.comhttps://security.netapp.com/advisory/ntap-20240510-0007/
af854a3a-2127-422b-91ae-364da2661108https://discuss.rubyonrails.org/t/possible-dos-vulnerability-with-range-header-in-rack/84944
af854a3a-2127-422b-91ae-364da2661108https://github.com/rack/rack/commit/4849132bef471adb21131980df745f4bb84de2d9
af854a3a-2127-422b-91ae-364da2661108https://github.com/rack/rack/commit/62457686b26d33a15a254c7768c2076e8e02b48b
af854a3a-2127-422b-91ae-364da2661108https://github.com/rack/rack/security/advisories/GHSA-xj5v-6v4g-jfw6
af854a3a-2127-422b-91ae-364da2661108https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2024-26141.yml
af854a3a-2127-422b-91ae-364da2661108https://lists.debian.org/debian-lts-announce/2024/04/msg00022.html
af854a3a-2127-422b-91ae-364da2661108https://security.netapp.com/advisory/ntap-20240510-0007/
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-01T23:59:32.578Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "https://github.com/rack/rack/security/advisories/GHSA-xj5v-6v4g-jfw6",
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://github.com/rack/rack/security/advisories/GHSA-xj5v-6v4g-jfw6"
          },
          {
            "name": "https://github.com/rack/rack/commit/4849132bef471adb21131980df745f4bb84de2d9",
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://github.com/rack/rack/commit/4849132bef471adb21131980df745f4bb84de2d9"
          },
          {
            "name": "https://github.com/rack/rack/commit/62457686b26d33a15a254c7768c2076e8e02b48b",
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://github.com/rack/rack/commit/62457686b26d33a15a254c7768c2076e8e02b48b"
          },
          {
            "name": "https://discuss.rubyonrails.org/t/possible-dos-vulnerability-with-range-header-in-rack/84944",
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://discuss.rubyonrails.org/t/possible-dos-vulnerability-with-range-header-in-rack/84944"
          },
          {
            "name": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2024-26141.yml",
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2024-26141.yml"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00022.html"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://security.netapp.com/advisory/ntap-20240510-0007/"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:rack_project:rack:*:*:*:*:*:ruby:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "rack",
            "vendor": "rack_project",
            "versions": [
              {
                "lessThan": "3.0.9.1",
                "status": "affected",
                "version": "3.0.0",
                "versionType": "custom"
              },
              {
                "lessThan": "2.2.8.1",
                "status": "affected",
                "version": "1.3.0",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-26141",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-03-05T18:23:59.367185Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-08-28T17:55:43.187Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "rack",
          "vendor": "rack",
          "versions": [
            {
              "status": "affected",
              "version": "\u003e= 3.0.0, \u003c 3.0.9.1"
            },
            {
              "status": "affected",
              "version": "\u003e= 1.3.0, \u003c 2.2.8.1"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Rack is a modular Ruby web server interface. Carefully crafted Range headers can cause a server to respond with an unexpectedly large response. Responding with such large responses could lead to a denial of service issue. Vulnerable applications will use the `Rack::File` middleware or the `Rack::Utils.byte_ranges` methods (this includes Rails applications). The vulnerability is fixed in 3.0.9.1 and 2.2.8.1."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 5.8,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-400",
              "description": "CWE-400: Uncontrolled Resource Consumption",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-02-28T23:28:10.503Z",
        "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
        "shortName": "GitHub_M"
      },
      "references": [
        {
          "name": "https://github.com/rack/rack/security/advisories/GHSA-xj5v-6v4g-jfw6",
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://github.com/rack/rack/security/advisories/GHSA-xj5v-6v4g-jfw6"
        },
        {
          "name": "https://github.com/rack/rack/commit/4849132bef471adb21131980df745f4bb84de2d9",
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/rack/rack/commit/4849132bef471adb21131980df745f4bb84de2d9"
        },
        {
          "name": "https://github.com/rack/rack/commit/62457686b26d33a15a254c7768c2076e8e02b48b",
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/rack/rack/commit/62457686b26d33a15a254c7768c2076e8e02b48b"
        },
        {
          "name": "https://discuss.rubyonrails.org/t/possible-dos-vulnerability-with-range-header-in-rack/84944",
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://discuss.rubyonrails.org/t/possible-dos-vulnerability-with-range-header-in-rack/84944"
        },
        {
          "name": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2024-26141.yml",
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2024-26141.yml"
        },
        {
          "url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00022.html"
        },
        {
          "url": "https://security.netapp.com/advisory/ntap-20240510-0007/"
        }
      ],
      "source": {
        "advisory": "GHSA-xj5v-6v4g-jfw6",
        "discovery": "UNKNOWN"
      },
      "title": "Possible DoS Vulnerability with Range Header in Rack"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
    "assignerShortName": "GitHub_M",
    "cveId": "CVE-2024-26141",
    "datePublished": "2024-02-28T23:28:10.503Z",
    "dateReserved": "2024-02-14T17:40:03.688Z",
    "dateUpdated": "2024-08-28T17:55:43.187Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2024-26141\",\"sourceIdentifier\":\"security-advisories@github.com\",\"published\":\"2024-02-29T00:15:51.403\",\"lastModified\":\"2024-11-21T09:02:01.023\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Rack is a modular Ruby web server interface. Carefully crafted Range headers can cause a server to respond with an unexpectedly large response. Responding with such large responses could lead to a denial of service issue. Vulnerable applications will use the `Rack::File` middleware or the `Rack::Utils.byte_ranges` methods (this includes Rails applications). The vulnerability is fixed in 3.0.9.1 and 2.2.8.1.\"},{\"lang\":\"es\",\"value\":\"Rack es una interfaz modular de servidor web Ruby. Los encabezados de rango cuidadosamente elaborados pueden hacer que un servidor responda con una respuesta inesperadamente grande. Responder con respuestas tan amplias podr\u00eda dar lugar a un problema de denegaci\u00f3n de servicio. Las aplicaciones vulnerables utilizar\u00e1n el middleware `Rack::File` o los m\u00e9todos `Rack::Utils.byte_ranges` (esto incluye aplicaciones Rails). La vulnerabilidad se solucion\u00f3 en 3.0.9.1 y 2.2.8.1.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L\",\"baseScore\":5.8,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"LOW\"},\"exploitabilityScore\":3.9,\"impactScore\":1.4}]},\"weaknesses\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-400\"}]}],\"references\":[{\"url\":\"https://discuss.rubyonrails.org/t/possible-dos-vulnerability-with-range-header-in-rack/84944\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/rack/rack/commit/4849132bef471adb21131980df745f4bb84de2d9\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/rack/rack/commit/62457686b26d33a15a254c7768c2076e8e02b48b\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/rack/rack/security/advisories/GHSA-xj5v-6v4g-jfw6\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2024-26141.yml\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://lists.debian.org/debian-lts-announce/2024/04/msg00022.html\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://security.netapp.com/advisory/ntap-20240510-0007/\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://discuss.rubyonrails.org/t/possible-dos-vulnerability-with-range-header-in-rack/84944\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://github.com/rack/rack/commit/4849132bef471adb21131980df745f4bb84de2d9\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://github.com/rack/rack/commit/62457686b26d33a15a254c7768c2076e8e02b48b\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://github.com/rack/rack/security/advisories/GHSA-xj5v-6v4g-jfw6\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2024-26141.yml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.debian.org/debian-lts-announce/2024/04/msg00022.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://security.netapp.com/advisory/ntap-20240510-0007/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.