![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.1.12.2024.7036.1 |
Category: | Ubuntu Local Security Checks |
Title: | Ubuntu: Security Advisory (USN-7036-1) |
Summary: | The remote host is missing an update for the 'ruby-rack' package(s) announced via the USN-7036-1 advisory. |
Description: | Summary: The remote host is missing an update for the 'ruby-rack' package(s) announced via the USN-7036-1 advisory. Vulnerability Insight: It was discovered that Rack was not properly parsing data when processing multipart POST requests. If a user or automated system were tricked into sending a specially crafted multipart POST request to an application using Rack, a remote attacker could possibly use this issue to cause a denial of service. (CVE-2022-30122) It was discovered that Rack was not properly escaping untrusted data when performing logging operations, which could cause shell escaped sequences to be written to a terminal. If a user or automated system were tricked into sending a specially crafted request to an application using Rack, a remote attacker could possibly use this issue to execute arbitrary code in the machine running the application. (CVE-2022-30123) It was discovered that Rack did not properly structure regular expressions in some of its parsing components, which could result in uncontrolled resource consumption if an application using Rack received specially crafted input. A remote attacker could possibly use this issue to cause a denial of service. (CVE-2022-44570, CVE-2022-44571) It was discovered that Rack did not properly structure regular expressions in its multipart parsing component, which could result in uncontrolled resource consumption if an application using Rack to parse multipart posts received specially crafted input. A remote attacker could possibly use this issue to cause a denial of service. (CVE-2022-44572) It was discovered that Rack incorrectly handled Multipart MIME parsing. A remote attacker could possibly use this issue to cause Rack to consume resources, leading to a denial of service. (CVE-2023-27530) It was discovered that Rack incorrectly handled certain regular expressions. A remote attacker could possibly use this issue to cause Rack to consume resources, leading to a denial of service. (CVE-2023-27539) It was discovered that Rack incorrectly parsed certain media types. A remote attacker could possibly use this issue to cause Rack to consume resources, leading to a denial of service. (CVE-2024-25126) It was discovered that Rack incorrectly handled certain Range headers. A remote attacker could possibly use this issue to cause Rack to create large responses, leading to a denial of service. (CVE-2024-26141) It was discovered that Rack incorrectly handled certain crafted headers. A remote attacker could possibly use this issue to cause Rack to consume resources, leading to a denial of service. (CVE-2024-26146) Affected Software/OS: 'ruby-rack' package(s) on Ubuntu 22.04. Solution: Please install the updated package(s). CVSS Score: 10.0 CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2022-30122 Debian Security Information: DSA-5530 (Google Search) https://www.debian.org/security/2023/dsa-5530 https://security.gentoo.org/glsa/202310-18 https://discuss.rubyonrails.org/t/cve-2022-30122-denial-of-service-vulnerability-in-rack-multipart-parsing/80729 Common Vulnerability Exposure (CVE) ID: CVE-2022-30123 https://discuss.rubyonrails.org/t/cve-2022-30123-possible-shell-escape-sequence-injection-vulnerability-in-rack/80728 Common Vulnerability Exposure (CVE) ID: CVE-2022-44570 https://discuss.rubyonrails.org/t/cve-2022-44570-possible-denial-of-service-vulnerability-in-racks-range-header-parsing/82125 Common Vulnerability Exposure (CVE) ID: CVE-2022-44571 https://discuss.rubyonrails.org/t/cve-2022-44571-possible-denial-of-service-vulnerability-in-rack-content-disposition-parsing/82126 Common Vulnerability Exposure (CVE) ID: CVE-2022-44572 https://hackerone.com/reports/1639882 Common Vulnerability Exposure (CVE) ID: CVE-2023-27530 https://discuss.rubyonrails.org/t/cve-2023-27530-possible-dos-vulnerability-in-multipart-mime-parsing/82388 https://lists.debian.org/debian-lts-announce/2023/04/msg00017.html Common Vulnerability Exposure (CVE) ID: CVE-2023-27539 Common Vulnerability Exposure (CVE) ID: CVE-2024-25126 https://discuss.rubyonrails.org/t/denial-of-service-vulnerability-in-rack-content-type-parsing/84941 https://github.com/rack/rack/commit/6efb2ceea003c4b195815a614e00438cbd543462 https://github.com/rack/rack/commit/d9c163a443b8cadf4711d84bd2c58cb9ef89cf49 https://github.com/rack/rack/security/advisories/GHSA-22f2-v57c-j9cx https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2024-25126.yml https://lists.debian.org/debian-lts-announce/2024/04/msg00022.html Common Vulnerability Exposure (CVE) ID: CVE-2024-26141 https://discuss.rubyonrails.org/t/possible-dos-vulnerability-with-range-header-in-rack/84944 https://github.com/rack/rack/commit/4849132bef471adb21131980df745f4bb84de2d9 https://github.com/rack/rack/commit/62457686b26d33a15a254c7768c2076e8e02b48b https://github.com/rack/rack/security/advisories/GHSA-xj5v-6v4g-jfw6 https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2024-26141.yml Common Vulnerability Exposure (CVE) ID: CVE-2024-26146 https://discuss.rubyonrails.org/t/possible-denial-of-service-vulnerability-in-rack-header-parsing/84942 https://github.com/rack/rack/commit/30b8e39a578b25d4bdcc082c1c52c6f164b59716 https://github.com/rack/rack/commit/6c5d90bdcec0949f7ba06db62fb740dab394b582 https://github.com/rack/rack/commit/a227cd793778c7c3a827d32808058571569cda6f https://github.com/rack/rack/commit/e4c117749ba24a66f8ec5a08eddf68deeb425ccd https://github.com/rack/rack/security/advisories/GHSA-54rr-7fvw-6x8f https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2024-26146.yml |
Copyright | Copyright (C) 2024 Greenbone AG |
This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |