CVE-2024-26141

Rack is a modular Ruby web server interface. Carefully crafted Range headers can cause a server to respond with an unexpectedly large response. Responding with such large responses could lead to a denial of service issue. Vulnerable applications will use the `Rack::File` middleware or the `Rack::Utils.byte_ranges` methods (this includes Rails applications). The vulnerability is fixed in 3.0.9.1 and 2.2.8.1.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:rack:rack:*:*:*:*:*:ruby:*:*
cpe:2.3:a:rack:rack:*:*:*:*:*:ruby:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

History

14 Feb 2025, 15:33

Type Values Removed Values Added
CPE cpe:2.3:a:rack:rack:*:*:*:*:*:ruby:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
References () https://discuss.rubyonrails.org/t/possible-dos-vulnerability-with-range-header-in-rack/84944 - () https://discuss.rubyonrails.org/t/possible-dos-vulnerability-with-range-header-in-rack/84944 - Exploit, Vendor Advisory
References () https://github.com/rack/rack/commit/4849132bef471adb21131980df745f4bb84de2d9 - () https://github.com/rack/rack/commit/4849132bef471adb21131980df745f4bb84de2d9 - Patch
References () https://github.com/rack/rack/commit/62457686b26d33a15a254c7768c2076e8e02b48b - () https://github.com/rack/rack/commit/62457686b26d33a15a254c7768c2076e8e02b48b - Patch
References () https://github.com/rack/rack/security/advisories/GHSA-xj5v-6v4g-jfw6 - () https://github.com/rack/rack/security/advisories/GHSA-xj5v-6v4g-jfw6 - Vendor Advisory
References () https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2024-26141.yml - () https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2024-26141.yml - Exploit, Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2024/04/msg00022.html - () https://lists.debian.org/debian-lts-announce/2024/04/msg00022.html - Mailing List
References () https://security.netapp.com/advisory/ntap-20240510-0007/ - () https://security.netapp.com/advisory/ntap-20240510-0007/ - Third Party Advisory
CWE NVD-CWE-noinfo
First Time Debian debian Linux
Rack
Rack rack
Debian

21 Nov 2024, 09:02

Type Values Removed Values Added
References () https://discuss.rubyonrails.org/t/possible-dos-vulnerability-with-range-header-in-rack/84944 - () https://discuss.rubyonrails.org/t/possible-dos-vulnerability-with-range-header-in-rack/84944 -
References () https://github.com/rack/rack/commit/4849132bef471adb21131980df745f4bb84de2d9 - () https://github.com/rack/rack/commit/4849132bef471adb21131980df745f4bb84de2d9 -
References () https://github.com/rack/rack/commit/62457686b26d33a15a254c7768c2076e8e02b48b - () https://github.com/rack/rack/commit/62457686b26d33a15a254c7768c2076e8e02b48b -
References () https://github.com/rack/rack/security/advisories/GHSA-xj5v-6v4g-jfw6 - () https://github.com/rack/rack/security/advisories/GHSA-xj5v-6v4g-jfw6 -
References () https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2024-26141.yml - () https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2024-26141.yml -
References () https://lists.debian.org/debian-lts-announce/2024/04/msg00022.html - () https://lists.debian.org/debian-lts-announce/2024/04/msg00022.html -
References () https://security.netapp.com/advisory/ntap-20240510-0007/ - () https://security.netapp.com/advisory/ntap-20240510-0007/ -

10 Jun 2024, 17:16

Type Values Removed Values Added
References
  • () https://security.netapp.com/advisory/ntap-20240510-0007/ -

29 Apr 2024, 11:15

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/04/msg00022.html -

29 Feb 2024, 00:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-02-29 00:15

Updated : 2025-02-14 15:33


NVD link : CVE-2024-26141

Mitre link : CVE-2024-26141

CVE.ORG link : CVE-2024-26141


JSON object : View

Products Affected

debian

  • debian_linux

rack

  • rack
CWE
CWE-400

Uncontrolled Resource Consumption

NVD-CWE-noinfo