CVE-2022-44571
Severity CVSS v4.0:
Pending analysis
Type:
CWE-400
Uncontrolled Resource Consumption ('Resource Exhaustion')
Publication date:
09/02/2023
Last modified:
13/02/2025
Description
There is a denial of service vulnerability in the Content-Disposition parsingcomponent of Rack fixed in 2.0.9.2, 2.1.4.2, 2.2.4.1, 3.0.0.1. This could allow an attacker to craft an input that can cause Content-Disposition header parsing in Rackto take an unexpected amount of time, possibly resulting in a denial ofservice attack vector. This header is used typically used in multipartparsing. Any applications that parse multipart posts using Rack (virtuallyall Rails applications) are impacted.
Impact
Base Score 3.x
7.50
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:rack:rack:*:*:*:*:*:ruby:*:* | 2.0.0 (including) | 2.0.9.2 (excluding) |
| cpe:2.3:a:rack:rack:*:*:*:*:*:ruby:*:* | 2.1.0 (including) | 2.1.4.2 (excluding) |
| cpe:2.3:a:rack:rack:*:*:*:*:*:ruby:*:* | 2.2.0 (including) | 2.2.6.1 (excluding) |
| cpe:2.3:a:rack:rack:*:*:*:*:*:ruby:*:* | 3.0.0.0 (including) | 3.0.4.1 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://discuss.rubyonrails.org/t/cve-2022-44571-possible-denial-of-service-vulnerability-in-rack-content-disposition-parsing/82126
- https://security.netapp.com/advisory/ntap-20231208-0013/
- https://www.debian.org/security/2023/dsa-5530
- https://discuss.rubyonrails.org/t/cve-2022-44571-possible-denial-of-service-vulnerability-in-rack-content-disposition-parsing/82126
- https://security.netapp.com/advisory/ntap-20231208-0013/
- https://www.debian.org/security/2023/dsa-5530



