Debian Ruby-Rack vulnerabilities
50 known vulnerabilities affecting debian/ruby-rack.
Total CVEs
50
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
CRITICAL1HIGH18MEDIUM27LOW4
Vulnerabilities
Page 2 of 3
CVE-2025-61772HIGHCVSS 7.5fixed in ruby-rack 2.2.20-0+deb12u1 (bookworm)2025
CVE-2025-61772 [HIGH] CVE-2025-61772: ruby-rack - Rack is a modular Ruby web server interface. In versions prior to 2.2.19, 3.1.17...
Rack is a modular Ruby web server interface. In versions prior to 2.2.19, 3.1.17, and 3.2.2, `Rack::Multipart::Parser` can accumulate unbounded data when a multipart part’s header block never terminates with the required blank line (`CRLFCRLF`). The parser keeps appending incoming bytes to memory without a size cap, allowing a remote attacker to exhaust memory and
debian
CVE-2025-59830HIGHCVSS 7.5fixed in ruby-rack 2.2.20-0+deb12u1 (bookworm)2025
CVE-2025-59830 [HIGH] CVE-2025-59830: ruby-rack - Rack is a modular Ruby web server interface. Prior to version 2.2.18, Rack::Quer...
Rack is a modular Ruby web server interface. Prior to version 2.2.18, Rack::QueryParser enforces its params_limit only for parameters separated by &, while still splitting on both & and ;. As a result, attackers could use ; separators to bypass the parameter count limit and submit more parameters than intended. Applications or middleware that directly invoke Rack:
debian
CVE-2025-27111MEDIUMCVSS 6.9fixed in ruby-rack 2.2.13-1~deb12u1 (bookworm)2025
CVE-2025-27111 [MEDIUM] CVE-2025-27111: ruby-rack - Rack is a modular Ruby web server interface. The Rack::Sendfile middleware logs ...
Rack is a modular Ruby web server interface. The Rack::Sendfile middleware logs unsanitised header values from the X-Sendfile-Type header. An attacker can exploit this by injecting escape sequences (such as newline characters) into the header, resulting in log injection. This vulnerability is fixed in 2.2.12, 3.0.13, and 3.1.11.
Scope: local
bookworm: resolved (
debian
CVE-2025-61780MEDIUMCVSS 5.8fixed in ruby-rack 2.2.20-0+deb12u1 (bookworm)2025
CVE-2025-61780 [MEDIUM] CVE-2025-61780: ruby-rack - Rack is a modular Ruby web server interface. Prior to versions 2.2.20, 3.1.18, a...
Rack is a modular Ruby web server interface. Prior to versions 2.2.20, 3.1.18, and 3.2.3, a possible information disclosure vulnerability existed in `Rack::Sendfile` when running behind a proxy that supports `x-sendfile` headers (such as Nginx). Specially crafted headers could cause `Rack::Sendfile` to miscommunicate with the proxy and trigger unintended interna
debian
CVE-2025-25184MEDIUMCVSS 5.7fixed in ruby-rack 2.2.13-1~deb12u1 (bookworm)2025
CVE-2025-25184 [MEDIUM] CVE-2025-25184: ruby-rack - Rack provides an interface for developing web applications in Ruby. Prior to ver...
Rack provides an interface for developing web applications in Ruby. Prior to versions 2.2.11, 3.0.12, and 3.1.10, Rack::CommonLogger can be exploited by crafting input that includes newline characters to manipulate log entries. The supplied proof-of-concept demonstrates injecting malicious content into logs. When a user provides the authorization credentials via
debian
CVE-2025-32441MEDIUMCVSS 4.2fixed in ruby-rack 2.2.20-0+deb12u1 (bookworm)2025
CVE-2025-32441 [MEDIUM] CVE-2025-32441: ruby-rack - Rack is a modular Ruby web server interface. Prior to version 2.2.14, when using...
Rack is a modular Ruby web server interface. Prior to version 2.2.14, when using the `Rack::Session::Pool` middleware, simultaneous rack requests can restore a deleted rack session, which allows the unauthenticated user to occupy that session. Rack session middleware prepares the session at the beginning of request, then saves is back to the store with possible
debian
CVE-2025-49007LOWCVSS 7.5fixed in ruby-rack 3.1.16-0.1 (forky)2025
CVE-2025-49007 [HIGH] CVE-2025-49007: ruby-rack - Rack is a modular Ruby web server interface. Starting in version 3.1.0 and prior...
Rack is a modular Ruby web server interface. Starting in version 3.1.0 and prior to version 3.1.16, there is a denial of service vulnerability in the Content-Disposition parsing component of Rack. This is very similar to the previous security issue CVE-2022-44571. Carefully crafted input can cause Content-Disposition header parsing in Rack to take an unexpected am
debian
CVE-2024-26146MEDIUMCVSS 5.3fixed in ruby-rack 2.2.6.4-1+deb12u1 (bookworm)2024
CVE-2024-26146 [MEDIUM] CVE-2024-26146: ruby-rack - Rack is a modular Ruby web server interface. Carefully crafted headers can cause...
Rack is a modular Ruby web server interface. Carefully crafted headers can cause header parsing in Rack to take longer than expected resulting in a possible denial of service issue. Accept and Forwarded headers are impacted. Ruby 3.2 has mitigations for this problem, so Rack applications using Ruby 3.2 or newer are unaffected. This vulnerability is fixed in 2.0.
debian
CVE-2024-26141MEDIUMCVSS 5.8fixed in ruby-rack 2.2.6.4-1+deb12u1 (bookworm)2024
CVE-2024-26141 [MEDIUM] CVE-2024-26141: ruby-rack - Rack is a modular Ruby web server interface. Carefully crafted Range headers can...
Rack is a modular Ruby web server interface. Carefully crafted Range headers can cause a server to respond with an unexpectedly large response. Responding with such large responses could lead to a denial of service issue. Vulnerable applications will use the `Rack::File` middleware or the `Rack::Utils.byte_ranges` methods (this includes Rails applications). The
debian
CVE-2024-25126MEDIUMCVSS 5.3fixed in ruby-rack 2.2.6.4-1+deb12u1 (bookworm)2024
CVE-2024-25126 [MEDIUM] CVE-2024-25126: ruby-rack - Rack is a modular Ruby web server interface. Carefully crafted content type head...
Rack is a modular Ruby web server interface. Carefully crafted content type headers can cause Rack’s media type parser to take much longer than expected, leading to a possible denial of service vulnerability (ReDos 2nd degree polynomial). This vulnerability is patched in 3.0.9.1 and 2.2.8.1.
Scope: local
bookworm: resolved (fixed in 2.2.6.4-1+deb12u1)
bullseye:
debian
CVE-2024-39316LOWCVSS 5.32024
CVE-2024-39316 [MEDIUM] CVE-2024-39316: ruby-rack - Rack is a modular Ruby web server interface. Starting in version 3.1.0 and prior...
Rack is a modular Ruby web server interface. Starting in version 3.1.0 and prior to version 3.1.5, Regular Expression Denial of Service (ReDoS) vulnerability exists in the `Rack::Request::Helpers` module when parsing HTTP Accept headers. This vulnerability can be exploited by an attacker sending specially crafted `Accept-Encoding` or `Accept-Language` headers, c
debian
CVE-2023-27530HIGHCVSS 7.5fixed in ruby-rack 2.2.6.4-1 (bookworm)2023
CVE-2023-27530 [HIGH] CVE-2023-27530: ruby-rack - A DoS vulnerability exists in Rack <v3.0.4.2, <v2.2.6.3, <v2.1.4.3 and <v2.0.9.3...
A DoS vulnerability exists in Rack <v3.0.4.2, <v2.2.6.3, <v2.1.4.3 and <v2.0.9.3 within in the Multipart MIME parsing code in which could allow an attacker to craft requests that can be abuse to cause multipart parsing to take longer than expected.
Scope: local
bookworm: resolved (fixed in 2.2.6.4-1)
bullseye: resolved (fixed in 2.1.4-3+deb11u1)
forky: resolved (f
debian
CVE-2023-27539MEDIUMCVSS 5.3fixed in ruby-rack 2.2.6.4-1 (bookworm)2023
CVE-2023-27539 [MEDIUM] CVE-2023-27539: ruby-rack - There is a denial of service vulnerability in the header parsing component of Ra...
There is a denial of service vulnerability in the header parsing component of Rack.
Scope: local
bookworm: resolved (fixed in 2.2.6.4-1)
bullseye: resolved (fixed in 2.1.4-3+deb11u1)
forky: resolved (fixed in 2.2.6.4-1)
sid: resolved (fixed in 2.2.6.4-1)
trixie: resolved (fixed in 2.2.6.4-1)
debian
CVE-2022-30123CRITICALCVSS 10.0fixed in ruby-rack 2.2.4-1 (bookworm)2022
CVE-2022-30123 [CRITICAL] CVE-2022-30123: ruby-rack - A sequence injection vulnerability exists in Rack <2.0.9.1, <2.1.4.1 and <2.2.3....
A sequence injection vulnerability exists in Rack <2.0.9.1, <2.1.4.1 and <2.2.3.1 which could allow is a possible shell escape in the Lint and CommonLogger components of Rack.
Scope: local
bookworm: resolved (fixed in 2.2.4-1)
bullseye: resolved (fixed in 2.1.4-3+deb11u1)
forky: resolved (fixed in 2.2.4-1)
sid: resolved (fixed in 2.2.4-1)
trixie: resolved (fix
debian
CVE-2022-44571HIGHCVSS 7.5fixed in ruby-rack 2.2.4-3 (bookworm)2022
CVE-2022-44571 [HIGH] CVE-2022-44571: ruby-rack - There is a denial of service vulnerability in the Content-Disposition parsingcom...
There is a denial of service vulnerability in the Content-Disposition parsingcomponent of Rack fixed in 2.0.9.2, 2.1.4.2, 2.2.4.1, 3.0.0.1. This could allow an attacker to craft an input that can cause Content-Disposition header parsing in Rackto take an unexpected amount of time, possibly resulting in a denial ofservice attack vector. This header is used typicall
debian
CVE-2022-30122HIGHCVSS 7.5fixed in ruby-rack 2.2.4-1 (bookworm)2022
CVE-2022-30122 [HIGH] CVE-2022-30122: ruby-rack - A possible denial of service vulnerability exists in Rack <2.0.9.1, <2.1.4.1 and...
A possible denial of service vulnerability exists in Rack <2.0.9.1, <2.1.4.1 and <2.2.3.1 in the multipart parsing component of Rack.
Scope: local
bookworm: resolved (fixed in 2.2.4-1)
bullseye: resolved (fixed in 2.1.4-3+deb11u1)
forky: resolved (fixed in 2.2.4-1)
sid: resolved (fixed in 2.2.4-1)
trixie: resolved (fixed in 2.2.4-1)
debian
CVE-2022-44570HIGHCVSS 7.5fixed in ruby-rack 2.2.4-3 (bookworm)2022
CVE-2022-44570 [HIGH] CVE-2022-44570: ruby-rack - A denial of service vulnerability in the Range header parsing component of Rack ...
A denial of service vulnerability in the Range header parsing component of Rack >= 1.5.0. A Carefully crafted input can cause the Range header parsing component in Rack to take an unexpected amount of time, possibly resulting in a denial of service attack vector. Any applications that deal with Range requests (such as streaming applications, or applications that s
debian
CVE-2022-44572HIGHCVSS 7.5fixed in ruby-rack 2.2.4-3 (bookworm)2022
CVE-2022-44572 [HIGH] CVE-2022-44572: ruby-rack - A denial of service vulnerability in the multipart parsing component of Rack fix...
A denial of service vulnerability in the multipart parsing component of Rack fixed in 2.0.9.2, 2.1.4.2, 2.2.4.1 and 3.0.0.1 could allow an attacker tocraft input that can cause RFC2183 multipart boundary parsing in Rack to take an unexpected amount of time, possibly resulting in a denial of service attack vector. Any applications that parse multipart posts using R
debian
CVE-2020-8161HIGHCVSS 8.6fixed in ruby-rack 2.1.1-5 (bookworm)2020
CVE-2020-8161 [HIGH] CVE-2020-8161: ruby-rack - A directory traversal vulnerability exists in rack < 2.2.0 that allows an attack...
A directory traversal vulnerability exists in rack < 2.2.0 that allows an attacker perform directory traversal vulnerability in the Rack::Directory app that is bundled with Rack which could result in information disclosure.
Scope: local
bookworm: resolved (fixed in 2.1.1-5)
bullseye: resolved (fixed in 2.1.1-5)
forky: resolved (fixed in 2.1.1-5)
sid: resolved (fixed
debian
CVE-2020-8184HIGHCVSS 7.5fixed in ruby-rack 2.1.1-6 (bookworm)2020
CVE-2020-8184 [HIGH] CVE-2020-8184: ruby-rack - A reliance on cookies without validation/integrity check security vulnerability ...
A reliance on cookies without validation/integrity check security vulnerability exists in rack < 2.2.3, rack < 2.1.4 that makes it is possible for an attacker to forge a secure or host-only cookie prefix.
Scope: local
bookworm: resolved (fixed in 2.1.1-6)
bullseye: resolved (fixed in 2.1.1-6)
forky: resolved (fixed in 2.1.1-6)
sid: resolved (fixed in 2.1.1-6)
trixie
debian