CVE-2022-44572: Denial of service via multipart parsing in Rack
7.5
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.48363%
CWE
Published
1/18/2023
Updated
10/23/2023
KEV Status
No
Technology
Ruby
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| rack | rubygems | >= 2.0.0, < 2.0.9.2 | 2.0.9.2 |
| rack | rubygems | >= 2.1.0.0, < 2.1.4.2 | 2.1.4.2 |
| rack | rubygems | >= 2.2.0.0, < 2.2.6.1 | 2.2.6.1 |
| rack | rubygems | >= 3.0.0.0, < 3.0.4.1 | 3.0.4.1 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from inefficient regex handling in multipart boundary parsing (CWE-1333). The patches explicitly forbid control characters in attributes, indicating the vulnerable functions were involved in parsing multipart headers/boundaries. Rack's multipart parser (parser.rb) is the logical component handling this logic. The combination of CWE-1333 reference and the patch's focus on attribute validation strongly points to regex-based parsing functions in this module as the root cause.