We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
Rack is a modular Ruby web server interface. Starting in version 3.1.0 and prior to version 3.1.16, there is a denial of service vulnerability in the Content-Disposition parsing component of Rack. This is very similar to the previous security issue CVE-2022-44571. Carefully crafted input can cause Content-Disposition header parsing in Rack to take an unexpected amount of time, possibly resulting in a denial of service attack vector. This header is used typically used in multipart parsing. Any applications that parse multipart posts using Rack (virtually all Rails applications) are impacted. Version 3.1.16 contains a patch for the vulnerability.
Reserved 2025-05-29 | Published 2025-06-04 | Updated 2025-06-05 | Assigner GitHub_MCWE-770: Allocation of Resources Without Limits or Throttling
github.com/rack/rack/security/advisories/GHSA-47m2-26rw-j2jw
github.com/...ommit/4795831a0a310c2d31102749e551b38faab6401f
github.com/...ommit/aed514df37e33907df3c971ed3ca9a0a20ac2901
Support options