-
CVSS Score
-Basic Information
CVE ID
-
GHSA ID
-
EPSS Score
-
CWE
-
Published
-
Updated
-
KEV Status
-
Technology
-
The vulnerability stems from improper validation in the Range header processing. The commit diff explicitly modifies get_byte_ranges in lib/rack/utils.rb to add a critical size check. While Rack::File and Rack::Utils.byte_ranges are mentioned as entry points, the root cause is the unpatched get_byte_ranges method. The advisory confirms this by stating applications using these components are vulnerable, and the patch directly targets get_byte_ranges.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| rack | rubygems | >= 3.0.0, < 3.0.9.1 | 3.0.9.1 |
| rack | rubygems | >= 1.3.0, < 2.2.8.1 | 2.2.8.1 |
KEV Misses 88% of Exploited CVEs- Get the report