VYPR

RubyGems package

rack

pkg:gem/rack

Vulnerabilities (50)

  • CVE-2025-59830Sep 25, 2025
    affected < 2.2.18fixed 2.2.18

    Rack is a modular Ruby web server interface. Prior to version 2.2.18, Rack::QueryParser enforces its params_limit only for parameters separated by &, while still splitting on both & and ;. As a result, attackers could use ; separators to bypass the parameter count limit and submi

  • CVE-2025-49007Jun 4, 2025
    affected >= 3.1.0, < 3.1.16fixed 3.1.16

    Rack is a modular Ruby web server interface. Starting in version 3.1.0 and prior to version 3.1.16, there is a denial of service vulnerability in the Content-Disposition parsing component of Rack. This is very similar to the previous security issue CVE-2022-44571. Carefully craft

  • CVE-2025-46727May 7, 2025
    affected < 2.2.14fixed 2.2.14

    Rack is a modular Ruby web server interface. Prior to versions 2.2.14, 3.0.16, and 3.1.14, `Rack::QueryParser` parses query strings and `application/x-www-form-urlencoded` bodies into Ruby data structures without imposing any limit on the number of parameters, allowing attackers

  • CVE-2025-32441May 7, 2025
    affected < 2.2.14fixed 2.2.14

    Rack is a modular Ruby web server interface. Prior to version 2.2.14, when using the `Rack::Session::Pool` middleware, simultaneous rack requests can restore a deleted rack session, which allows the unauthenticated user to occupy that session. Rack session middleware prepares the

  • CVE-2025-27610Mar 10, 2025
    affected < 2.2.13fixed 2.2.13

    Rack provides an interface for developing web applications in Ruby. Prior to versions 2.2.13, 3.0.14, and 3.1.12, `Rack::Static` can serve files under the specified `root:` even if `urls:` are provided, which may expose other files under the specified `root:` unexpectedly. The vu

  • CVE-2025-27111Mar 4, 2025
    affected < 2.2.12fixed 2.2.12

    Rack is a modular Ruby web server interface. The Rack::Sendfile middleware logs unsanitised header values from the X-Sendfile-Type header. An attacker can exploit this by injecting escape sequences (such as newline characters) into the header, resulting in log injection. This vul

  • CVE-2025-25184Feb 12, 2025
    affected < 2.2.11fixed 2.2.11

    Rack provides an interface for developing web applications in Ruby. Prior to versions 2.2.11, 3.0.12, and 3.1.10, Rack::CommonLogger can be exploited by crafting input that includes newline characters to manipulate log entries. The supplied proof-of-concept demonstrates injecting

  • CVE-2023-27539Jan 9, 2025
    affected >= 2.0.0, < 2.2.6.4fixed 2.2.6.4

    There is a denial of service vulnerability in the header parsing component of Rack.

  • CVE-2024-39316Jul 2, 2024
    affected >= 3.1.0, < 3.1.5fixed 3.1.5

    Rack is a modular Ruby web server interface. Starting in version 3.1.0 and prior to version 3.1.5, Regular Expression Denial of Service (ReDoS) vulnerability exists in the `Rack::Request::Helpers` module when parsing HTTP Accept headers. This vulnerability can be exploited by an

  • CVE-2024-26141Feb 28, 2024
    affected >= 3.0.0, < 3.0.9.1fixed 3.0.9.1

    Rack is a modular Ruby web server interface. Carefully crafted Range headers can cause a server to respond with an unexpectedly large response. Responding with such large responses could lead to a denial of service issue. Vulnerable applications will use the `Rack::File` middlewa

  • CVE-2024-25126Feb 28, 2024
    affected >= 3.0.0, < 3.0.9.1fixed 3.0.9.1

    Rack is a modular Ruby web server interface. Carefully crafted content type headers can cause Rack’s media type parser to take much longer than expected, leading to a possible denial of service vulnerability (ReDos 2nd degree polynomial). This vulnerability is patched in 3.0.9.1

  • CVE-2024-26146Feb 28, 2024
    affected >= 3.0.0, < 3.0.9.1fixed 3.0.9.1

    Rack is a modular Ruby web server interface. Carefully crafted headers can cause header parsing in Rack to take longer than expected resulting in a possible denial of service issue. Accept and Forwarded headers are impacted. Ruby 3.2 has mitigations for this problem, so Rack appl

  • CVE-2023-27530Mar 10, 2023
    affected < 2.0.9.3fixed 2.0.9.3

    A DoS vulnerability exists in Rack <v3.0.4.2, <v2.2.6.3, <v2.1.4.3 and <v2.0.9.3 within in the Multipart MIME parsing code in which could allow an attacker to craft requests that can be abuse to cause multipart parsing to take longer than expected.

  • CVE-2022-44572Feb 9, 2023
    affected >= 2.0.0, < 2.0.9.2fixed 2.0.9.2

    A denial of service vulnerability in the multipart parsing component of Rack fixed in 2.0.9.2, 2.1.4.2, 2.2.4.1 and 3.0.0.1 could allow an attacker tocraft input that can cause RFC2183 multipart boundary parsing in Rack to take an unexpected amount of time, possibly resulting in

  • CVE-2022-44571Feb 9, 2023
    affected >= 2.0.0, < 2.0.9.2fixed 2.0.9.2

    There is a denial of service vulnerability in the Content-Disposition parsingcomponent of Rack fixed in 2.0.9.2, 2.1.4.2, 2.2.4.1, 3.0.0.1. This could allow an attacker to craft an input that can cause Content-Disposition header parsing in Rackto take an unexpected amount of time

  • CVE-2022-44570Feb 9, 2023
    affected >= 1.5.0, < 2.0.9.2fixed 2.0.9.2

    A denial of service vulnerability in the Range header parsing component of Rack >= 1.5.0. A Carefully crafted input can cause the Range header parsing component in Rack to take an unexpected amount of time, possibly resulting in a denial of service attack vector. Any applications

  • CVE-2022-30123Dec 5, 2022
    affected < 2.0.9.1fixed 2.0.9.1

    A sequence injection vulnerability exists in Rack <2.0.9.1, <2.1.4.1 and <2.2.3.1 which could allow is a possible shell escape in the Lint and CommonLogger components of Rack.

  • CVE-2022-30122Dec 5, 2022
    affected >= 1.2, < 2.0.9.1fixed 2.0.9.1

    A possible denial of service vulnerability exists in Rack <2.0.9.1, <2.1.4.1 and <2.2.3.1 in the multipart parsing component of Rack.

  • CVE-2020-8161Jul 2, 2020
    affected < 2.1.3fixed 2.1.3

    A directory traversal vulnerability exists in rack < 2.2.0 that allows an attacker perform directory traversal vulnerability in the Rack::Directory app that is bundled with Rack which could result in information disclosure.

  • CVE-2020-8184Jun 19, 2020
    affected < 2.1.4fixed 2.1.4

    A reliance on cookies without validation/integrity check security vulnerability exists in rack < 2.2.3, rack < 2.1.4 that makes it is possible for an attacker to forge a secure or host-only cookie prefix.