From 4730ef8318a5068fcd1420e86d3dbd63f17dc895 Mon Sep 17 00:00:00 2001 From: Al Snow Date: Thu, 5 Jun 2025 08:21:28 -0400 Subject: [PATCH] GHSA SYNC: 1 brand new advisory --- gems/rack/CVE-2025-49007.yml | 39 ++++++++++++++++++++++++++++++++++++ 1 file changed, 39 insertions(+) create mode 100644 gems/rack/CVE-2025-49007.yml diff --git a/gems/rack/CVE-2025-49007.yml b/gems/rack/CVE-2025-49007.yml new file mode 100644 index 0000000000..e1a23c1cd6 --- /dev/null +++ b/gems/rack/CVE-2025-49007.yml @@ -0,0 +1,39 @@ +--- +gem: rack +cve: 2025-49007 +ghsa: 47m2-26rw-j2jw +url: https://github.com/rack/rack/security/advisories/GHSA-47m2-26rw-j2jw +title: ReDoS Vulnerability in Rack::Multipart handle_mime_head +date: 2025-06-05 +description: | + ### Summary + + There is a denial of service vulnerability in the + Content-Disposition parsing component of Rack. This is very + similar to the previous security issue CVE-2022-44571. + + ### Details + + Carefully crafted input can cause Content-Disposition header + parsing in Rack to take an unexpected amount of time, possibly + resulting in a denial of service attack vector. This header is + used typically used in multipart parsing. Any applications that + parse multipart posts using Rack (virtually all Rails applications) + are impacted. + + ### Credits + + Thanks to [scyoon](https://hackerone.com/scyoon) for reporting + this to the Rails security team +cvss_v4: 6.6 +unaffected_versions: + - "< 3.1.0" +patched_versions: + - ">= 3.1.16" +related: + url: + - https://nvd.nist.gov/vuln/detail/CVE-2025-49007 + - https://github.com/rack/rack/security/advisories/GHSA-47m2-26rw-j2jw + - https://github.com/rack/rack/commit/4795831a0a310c2d31102749e551b38faab6401f + - https://github.com/rack/rack/commit/aed514df37e33907df3c971ed3ca9a0a20ac2901 + - https://github.com/advisories/GHSA-47m2-26rw-j2jw