CVE-2024-26141

Source
https://cve.org/CVERecord?id=CVE-2024-26141
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-26141.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-26141
Aliases
Downstream
Related
Published
2024-02-28T23:28:10.503Z
Modified
2026-04-30T12:11:32.553323Z
Severity
  • 5.8 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L CVSS Calculator
Summary
Possible DoS Vulnerability with Range Header in Rack
Details

Rack is a modular Ruby web server interface. Carefully crafted Range headers can cause a server to respond with an unexpectedly large response. Responding with such large responses could lead to a denial of service issue. Vulnerable applications will use the Rack::File middleware or the Rack::Utils.byte_ranges methods (this includes Rails applications). The vulnerability is fixed in 3.0.9.1 and 2.2.8.1.

Database specific
{
    "cwe_ids": [
        "CWE-400"
    ],
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/26xxx/CVE-2024-26141.json",
    "unresolved_ranges": [
        {
            "extracted_events": [
                {
                    "introduced": "3.0.0"
                },
                {
                    "fixed": "3.0.9.1"
                },
                {
                    "introduced": "1.3.0"
                },
                {
                    "fixed": "2.2.8.1"
                }
            ],
            "source": "AFFECTED_FIELD"
        }
    ],
    "cna_assigner": "GitHub_M"
}
References

Affected packages

Git / github.com/rack/rack

Affected ranges

Type
GIT
Repo
https://github.com/rack/rack
Events
Database specific
{
    "versions": [
        {
            "introduced": "1.3.0"
        },
        {
            "fixed": "2.2.8.1"
        },
        {
            "introduced": "3.0.0"
        },
        {
            "fixed": "3.0.9.1"
        }
    ]
}

Affected versions

1.*
1.3.0
1.4.0
1.4.1
1.5.0
1.5.1
1.6.0.beta
2.*
2.0.0
2.0.0.alpha
2.0.0.rc1
2.0.1
2.1.0
2.2.0
2.2.3
2.2.4
3.*
3.0.0
v2.*
v2.2.1
v2.2.2
v2.2.5
v2.2.6
v2.2.6.1
v2.2.6.2
v2.2.7
v2.2.8
v3.*
v3.0.1
v3.0.2
v3.0.3
v3.0.4
v3.0.4.1
v3.0.5
v3.0.6
v3.0.7
v3.0.8
v3.0.9

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-26141.json"
unresolved_ranges
[
    {
        "events": [
            {
                "introduced": "0"
            },
            {
                "last_affected": "10.0"
            }
        ]
    }
]