Vulnerability Description
A denial of service vulnerability in the multipart parsing component of Rack fixed in 2.0.9.2, 2.1.4.2, 2.2.4.1 and 3.0.0.1 could allow an attacker tocraft input that can cause RFC2183 multipart boundary parsing in Rack to take an unexpected amount of time, possibly resulting in a denial of service attack vector. Any applications that parse multipart posts using Rack (virtually all Rails applications) are impacted.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Rack | Rack | < 2.0.9.2 |
Related Weaknesses (CWE)
References
- https://hackerone.com/reports/1639882Permissions RequiredThird Party Advisory
- https://security.netapp.com/advisory/ntap-20231208-0014/
- https://www.debian.org/security/2023/dsa-5530
- https://hackerone.com/reports/1639882Permissions RequiredThird Party Advisory
- https://security.netapp.com/advisory/ntap-20231208-0014/
- https://www.debian.org/security/2023/dsa-5530
FAQ
What is CVE-2022-44572?
CVE-2022-44572 is a vulnerability with a CVSS score of 7.5 (HIGH). A denial of service vulnerability in the multipart parsing component of Rack fixed in 2.0.9.2, 2.1.4.2, 2.2.4.1 and 3.0.0.1 could allow an attacker tocraft input that can cause RFC2183 multipart bound...
How severe is CVE-2022-44572?
CVE-2022-44572 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-44572?
Check the references section above for vendor advisories and patch information. Affected products include: Rack Rack.