Moderate severityNVD Advisory· Published Mar 1, 2013· Updated Apr 29, 2026
CVE-2013-0184
CVE-2013-0184
Description
Unspecified vulnerability in Rack::Auth::AbstractRequest in Rack 1.1.x before 1.1.5, 1.2.x before 1.2.7, 1.3.x before 1.3.9, and 1.4.x before 1.4.4 allows remote attackers to cause a denial of service via unknown vectors related to "symbolized arbitrary strings."
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
rackRubyGems | >= 1.1.0, < 1.1.5 | 1.1.5 |
rackRubyGems | >= 1.2.0, < 1.2.7 | 1.2.7 |
rackRubyGems | >= 1.3.0, < 1.3.9 | 1.3.9 |
rackRubyGems | >= 1.4.0, < 1.4.4 | 1.4.4 |
Affected products
23cpe:2.3:a:rack_project:rack:1.1.0:*:*:*:*:*:*:*+ 22 more
- cpe:2.3:a:rack_project:rack:1.1.0:*:*:*:*:*:*:*
- cpe:2.3:a:rack_project:rack:1.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:rack_project:rack:1.1.3:*:*:*:*:*:*:*
- cpe:2.3:a:rack_project:rack:1.1.4:*:*:*:*:*:*:*
- cpe:2.3:a:rack_project:rack:1.2.0:*:*:*:*:*:*:*
- cpe:2.3:a:rack_project:rack:1.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:rack_project:rack:1.2.2:*:*:*:*:*:*:*
- cpe:2.3:a:rack_project:rack:1.2.3:*:*:*:*:*:*:*
- cpe:2.3:a:rack_project:rack:1.2.4:*:*:*:*:*:*:*
- cpe:2.3:a:rack_project:rack:1.2.6:*:*:*:*:*:*:*
- cpe:2.3:a:rack_project:rack:1.3.0:*:*:*:*:*:*:*
- cpe:2.3:a:rack_project:rack:1.3.1:*:*:*:*:*:*:*
- cpe:2.3:a:rack_project:rack:1.3.2:*:*:*:*:*:*:*
- cpe:2.3:a:rack_project:rack:1.3.3:*:*:*:*:*:*:*
- cpe:2.3:a:rack_project:rack:1.3.4:*:*:*:*:*:*:*
- cpe:2.3:a:rack_project:rack:1.3.5:*:*:*:*:*:*:*
- cpe:2.3:a:rack_project:rack:1.3.6:*:*:*:*:*:*:*
- cpe:2.3:a:rack_project:rack:1.3.7:*:*:*:*:*:*:*
- cpe:2.3:a:rack_project:rack:1.3.8:*:*:*:*:*:*:*
- cpe:2.3:a:rack_project:rack:1.4.0:*:*:*:*:*:*:*
- cpe:2.3:a:rack_project:rack:1.4.1:*:*:*:*:*:*:*
- cpe:2.3:a:rack_project:rack:1.4.2:*:*:*:*:*:*:*
- cpe:2.3:a:rack_project:rack:1.4.3:*:*:*:*:*:*:*
Patches
11f61549529d0Update README for release. Add security section.
1 file changed · +10 −0
README.rdoc+10 −0 modified@@ -479,11 +479,21 @@ run on port 11211) and memcache-client installed. * January 7th, 2013: Thirty first public release 1.4.3 * Security: Prevent unbounded reads in large multipart boundaries +* January 13th, 2013: Thirty second public release 1.4.4, 1.3.9, 1.2.7, 1.1.5 + * [SEC] Rack::Auth::AbstractRequest no longer symbolizes arbitrary strings + * Fixed erroneous test case in the 1.3.x series + == Contact Please post bugs, suggestions and patches to the bug tracker at <http://github.com/rack/rack/issues>. +Please post security related bugs and suggestions to the core team at +<https://groups.google.com/group/rack-core> or rack-core@googlegroups.com. Due +to wide usage of the library, it is strongly preferred that we manage timing in +order to provide viable patches at the time of disclosure. Your assistance in +this matter is greatly appreciated. + Mailing list archives are available at <http://groups.google.com/group/rack-devel>.
Vulnerability mechanics
Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
11- github.com/advisories/GHSA-v882-ccj6-jc48ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2013-0184ghsaADVISORY
- lists.opensuse.org/opensuse-updates/2013-03/msg00048.htmlnvdWEB
- rhn.redhat.com/errata/RHSA-2013-0544.htmlnvdWEB
- rhn.redhat.com/errata/RHSA-2013-0548.htmlnvdWEB
- www.debian.org/security/2013/dsa-2783nvdWEB
- access.redhat.com/errata/RHSA-2013:0544ghsaWEB
- access.redhat.com/errata/RHSA-2013:0548ghsaWEB
- access.redhat.com/security/cve/CVE-2013-0184ghsaWEB
- bugzilla.redhat.com/show_bug.cginvdWEB
- github.com/rack/rack/commit/1f61549529d07abd4aa512b8320ab0e97dcacc5dghsaWEB
News mentions
0No linked articles in our index yet.