Skip to content

Commit

Permalink
security/vuxml: Document possible DoS vulnerability in rack
Browse files Browse the repository at this point in the history
  • Loading branch information
Yasuhiro Kimura authored and Yasuhiro Kimura committed Mar 6, 2023
1 parent 1f30d7b commit ea12c50
Showing 1 changed file with 40 additions and 0 deletions.
40 changes: 40 additions & 0 deletions security/vuxml/vuln/2023.xml
@@ -1,3 +1,43 @@
<vuln vid="f0798a6a-bbdb-11ed-ba99-080027f5fec9">
<topic>rack -- possible DoS vulnerability in multipart MIME parsing</topic>
<affects>
<package>
<name>rubygem-rack</name>
<range><lt>3.0.4.2,3</lt></range>
</package>
<package>
<name>rubygem-rack22</name>
<range><lt>2.2.6.6,3</lt></range>
</package>
<package>
<name>rubygem-rack16</name>
<range><lt>1.6.14</lt></range>
</package>
</affects>
<description>
<body xmlns="http://www.w3.org/1999/xhtml">
<p>Aaron Patterson reports:</p>
<blockquote cite="https://discuss.rubyonrails.org/t/cve-2023-27530-possible-dos-vulnerability-in-multipart-mime-parsing/82388">
<p>
The Multipart MIME parsing code in Rack limits the number
of file parts, but does not limit the total number of
parts that can be uploaded. Carefully crafted requests can
abuse this and cause multipart parsing to take longer than
expected.
</p>
</blockquote>
</body>
</description>
<references>
<cvename>CVE-2023-27530</cvename>
<url>https://discuss.rubyonrails.org/t/cve-2023-27530-possible-dos-vulnerability-in-multipart-mime-parsing/82388</url>
</references>
<dates>
<discovery>2023-03-03</discovery>
<entry>2023-03-06</entry>
</dates>
</vuln>

<vuln vid="be233fc6-bae7-11ed-a4fb-080027f5fec9">
<topic>curl -- multiple vulnerabilities</topic>
<affects>
Expand Down

0 comments on commit ea12c50

Please sign in to comment.