CVE-2024-26141

Rack is a modular Ruby web server interface. Carefully crafted Range headers can cause a server to respond with an unexpectedly large response. Responding with such large responses could lead to a denial of service issue. Vulnerable applications will use the `Rack::File` middleware or the `Rack::Utils.byte_ranges` methods (this includes Rails applications). The vulnerability is fixed in 3.0.9.1 and 2.2.8.1.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
5.8 MEDIUM
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L
GitHub_MCNA
5.8 MEDIUM
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L
CVEADP
---
---
CISA-ADPADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 48%
VendorProductVersion
rackrack
1.3.0 ≤
𝑥
< 2.2.8.1
rackrack
3.0.0 ≤
𝑥
< 3.0.9.1
debiandebian_linux
10.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
ruby-rack
bullseye
2.1.4-3+deb11u2
fixed
bullseye (security)
2.1.4-3+deb11u3
fixed
bookworm
2.2.13-1~deb12u1
fixed
bookworm (security)
2.2.13-1~deb12u1
fixed
sid
3.1.12-1
fixed
trixie
3.1.12-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
ruby-rack
plucky
not-affected
oracular
not-affected
noble
Fixed 2.2.7-1ubuntu0.1
released
mantic
Fixed 2.2.4-3ubuntu0.1
released
jammy
Fixed 2.1.4-5ubuntu1.1
released
focal
Fixed 2.0.7-2ubuntu0.1+esm5
released
bionic
Fixed 1.6.4-4ubuntu0.2+esm6
released
xenial
Fixed 1.6.4-3ubuntu0.2+esm6
released
trusty
Fixed 1.5.2-3+deb8u3ubuntu1~esm8
released