We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-49007

ReDoS Vulnerability in Rack::Multipart handle_mime_head



Description

Rack is a modular Ruby web server interface. Starting in version 3.1.0 and prior to version 3.1.16, there is a denial of service vulnerability in the Content-Disposition parsing component of Rack. This is very similar to the previous security issue CVE-2022-44571. Carefully crafted input can cause Content-Disposition header parsing in Rack to take an unexpected amount of time, possibly resulting in a denial of service attack vector. This header is used typically used in multipart parsing. Any applications that parse multipart posts using Rack (virtually all Rails applications) are impacted. Version 3.1.16 contains a patch for the vulnerability.

Reserved 2025-05-29 | Published 2025-06-04 | Updated 2025-06-05 | Assigner GitHub_M


MEDIUM: 6.6CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U

Problem types

CWE-770: Allocation of Resources Without Limits or Throttling

Product status

>= 3.1.0, < 3.1.16
affected

References

github.com/rack/rack/security/advisories/GHSA-47m2-26rw-j2jw

github.com/...ommit/4795831a0a310c2d31102749e551b38faab6401f

github.com/...ommit/aed514df37e33907df3c971ed3ca9a0a20ac2901

cve.org (CVE-2025-49007)

nvd.nist.gov (CVE-2025-49007)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-49007

Support options

Helpdesk Chat, Email, Knowledgebase