CVE-2022-44571

EUVD-2023-0420
There is a denial of service vulnerability in the Content-Disposition parsingcomponent of Rack fixed in 2.0.9.2, 2.1.4.2, 2.2.4.1, 3.0.0.1. This could allow an attacker to craft an input that can cause Content-Disposition header parsing in Rackto take an unexpected amount of time, possibly resulting in a denial ofservice attack vector. This header is used typically used in multipartparsing. Any applications that parse multipart posts using Rack (virtuallyall Rails applications) are impacted.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
7.5 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 87%
Affected Products (NVD)
VendorProductVersion
rackrack
2.0.0 ≤
𝑥
< 2.0.9.2
rackrack
2.1.0 ≤
𝑥
< 2.1.4.2
rackrack
2.2.0 ≤
𝑥
< 2.2.6.1
rackrack
3.0.0.0 ≤
𝑥
< 3.0.4.1
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
ruby-rack
bookworm
2.2.6.4-1+deb12u1
fixed
bookworm (security)
2.2.6.4-1+deb12u1
fixed
bullseye
2.1.4-3+deb11u2
fixed
bullseye (security)
2.1.4-3+deb11u2
fixed
sid
2.2.7-1.1
fixed
trixie
2.2.7-1.1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
ruby-rack
bionic
Fixed 1.6.4-4ubuntu0.2+esm4
released
focal
Fixed 2.0.7-2ubuntu0.1+esm3
released
jammy
Fixed 2.1.4-5ubuntu1+esm3
released
kinetic
ignored
lunar
not-affected
mantic
not-affected
noble
not-affected
trusty
Fixed 1.5.2-3+deb8u3ubuntu1~esm6
released
xenial
Fixed 1.6.4-3ubuntu0.2+esm4
released