GHSA-47m2-26rw-j2jw

Suggest an improvement
Source
https://github.com/advisories/GHSA-47m2-26rw-j2jw
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/06/GHSA-47m2-26rw-j2jw/GHSA-47m2-26rw-j2jw.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-47m2-26rw-j2jw
Aliases
Published
2025-06-05T05:21:34Z
Modified
2025-06-05T20:32:53.349216Z
Downstream
Severity
  • 6.6 (Medium) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U CVSS Calculator
Summary
ReDoS Vulnerability in Rack::Multipart handle_mime_head
Details

Summary

There is a denial of service vulnerability in the Content-Disposition parsing component of Rack. This is very similar to the previous security issue CVE-2022-44571.

Details

Carefully crafted input can cause Content-Disposition header parsing in Rack to take an unexpected amount of time, possibly resulting in a denial of service attack vector. This header is used typically used in multipart parsing. Any applications that parse multipart posts using Rack (virtually all Rails applications) are impacted.

Credits

Thanks to scyoon for reporting this to the Rails security team

Database specific
{
    "nvd_published_at": "2025-06-04T23:15:21Z",
    "cwe_ids": [
        "CWE-770"
    ],
    "severity": "MODERATE",
    "github_reviewed": true,
    "github_reviewed_at": "2025-06-05T05:21:34Z"
}
References

Affected packages

RubyGems / rack

Package

Name
rack
Purl
pkg:gem/rack

Affected ranges

Type
ECOSYSTEM
Events
Introduced
3.1.0
Fixed
3.1.16

Affected versions

3.*

3.1.0
3.1.1
3.1.2
3.1.3
3.1.4
3.1.5
3.1.6
3.1.7
3.1.8
3.1.9
3.1.10
3.1.11
3.1.12
3.1.13
3.1.14
3.1.15