Metrics
Affected Vendors & Products
Fri, 10 Oct 2025 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-1333 | |
| CPEs | cpe:2.3:a:rack:rack:*:*:*:*:*:ruby:*:* | |
| Metrics |
cvssV3_1
|
cvssV3_1
|
Fri, 06 Jun 2025 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
cvssV3_1
|
Thu, 05 Jun 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 04 Jun 2025 23:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Rack is a modular Ruby web server interface. Starting in version 3.1.0 and prior to version 3.1.16, there is a denial of service vulnerability in the Content-Disposition parsing component of Rack. This is very similar to the previous security issue CVE-2022-44571. Carefully crafted input can cause Content-Disposition header parsing in Rack to take an unexpected amount of time, possibly resulting in a denial of service attack vector. This header is used typically used in multipart parsing. Any applications that parse multipart posts using Rack (virtually all Rails applications) are impacted. Version 3.1.16 contains a patch for the vulnerability. | |
| Title | ReDoS Vulnerability in Rack::Multipart handle_mime_head | |
| Weaknesses | CWE-770 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-06-04T22:42:52.515Z
Updated: 2025-06-05T14:11:25.234Z
Reserved: 2025-05-29T16:34:07.176Z
Link: CVE-2025-49007
Updated: 2025-06-05T13:20:39.506Z
Status : Analyzed
Published: 2025-06-04T23:15:21.540
Modified: 2025-10-10T16:42:17.133
Link: CVE-2025-49007