CVE-2026-34829Uncontrolled Resource Consumption in Rack

Severity
7.5HIGHNVD
EPSS
0.1%
top 81.38%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedApr 2
Latest updateApr 17

Description

Rack is a modular Ruby web server interface. Prior to versions 2.2.23, 3.1.21, and 3.2.6, Rack::Multipart::Parser only wraps the request body in a BoundedIO when CONTENT_LENGTH is present. When a multipart/form-data request is sent without a Content-Length header, such as with HTTP chunked transfer encoding, multipart parsing continues until end-of-stream with no total size limit. For file parts, the uploaded body is written directly to a temporary file on disk rather than being constrained by t

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages2 packages

CVEListV5rack/rack< 2.2.23+2
RubyGemsrack/rack3.0.0.beta13.1.21+2

🔴Vulnerability Details

5
OSV
CVE-2026-34829: (Rack is a modular Ruby web server interface2026-04-03
OSV
Rack's multipart parsing without Content-Length header allows unbounded chunked file uploads2026-04-02
CVEList
Rack: Denial of Service via Unbounded Multipart File Upload Without Content-Length2026-04-02
OSV
CVE-2026-34829: Rack is a modular Ruby web server interface2026-04-02
GHSA
Rack's multipart parsing without Content-Length header allows unbounded chunked file uploads2026-04-02

📋Vendor Advisories

3
Ubuntu
Rack vulnerabilities2026-04-17
Red Hat
rack: Rack: Denial of Service via unbounded multipart file upload2026-04-02
Debian
CVE-2026-34829: ruby-rack - Rack is a modular Ruby web server interface. Prior to versions 2.2.23, 3.1.21, a...2026

🕵️Threat Intelligence

1
Wiz
CVE-2026-34829 Impact, Exploitability, and Mitigation Steps | Wiz
CVE-2026-34829 — Uncontrolled Resource Consumption | cvebase