CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
Lifecycle Timeline
4Description
Rack is a modular Ruby web server interface. Starting in version 3.1.0 and prior to version 3.1.16, there is a denial of service vulnerability in the Content-Disposition parsing component of Rack. This is very similar to the previous security issue CVE-2022-44571. Carefully crafted input can cause Content-Disposition header parsing in Rack to take an unexpected amount of time, possibly resulting in a denial of service attack vector. This header is used typically used in multipart parsing. Any applications that parse multipart posts using Rack (virtually all Rails applications) are impacted. Version 3.1.16 contains a patch for the vulnerability.
Analysis
Rack is a modular Ruby web server interface. Starting in version 3.1.0 and prior to version 3.1.16, there is a denial of service vulnerability in the Content-Disposition parsing component of Rack. This is very similar to the previous security issue CVE-2022-44571. Carefully crafted input can cause Content-Disposition header parsing in Rack to take an unexpected amount of time, possibly resulting in a denial of service attack vector. This header is used typically used in multipart parsing. Any applications that parse multipart posts using Rack (virtually all Rails applications) are impacted. Version 3.1.16 contains a patch for the vulnerability.
Technical Context
A denial of service vulnerability allows an attacker to disrupt the normal functioning of a system, making it unavailable to legitimate users. This vulnerability is classified as Allocation of Resources Without Limits or Throttling (CWE-770).
Affected Products
Affected products: Rack Rack
Remediation
A vendor patch is available — apply it immediately. Implement rate limiting and input validation. Use timeout mechanisms for resource-intensive operations. Deploy DDoS protection where applicable.
Priority Score
Vendor Status
Ubuntu
Priority: Medium| Release | Status | Version |
|---|---|---|
| oracular | ignored | end of life, was needs-triage |
| bionic | not-affected | - |
| focal | not-affected | - |
| jammy | not-affected | - |
| noble | not-affected | - |
| plucky | not-affected | - |
| trusty | not-affected | - |
| upstream | released | 3.1.16 |
| xenial | not-affected | - |
Debian
Bug #1107363| Release | Status | Fixed Version | Urgency |
|---|---|---|---|
| bullseye | not-affected | - | - |
| bullseye (security) | fixed | 2.1.4-3+deb11u4 | - |
| bookworm, bookworm (security) | fixed | 2.2.20-0+deb12u1 | - |
| trixie (security), trixie | fixed | 3.1.18-1~deb13u1 | - |
| forky | fixed | 3.1.18-1 | - |
| sid | fixed | 3.2.5-1 | - |
| bookworm | not-affected | - | - |
| (unstable) | fixed | 3.1.16-0.1 | - |
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-16936
GHSA-47m2-26rw-j2jw