commit by to_remotes 2025-06-06 07:34:17 +0200 from cicd
parent
5f01584379
commit
30e2904a35
|
|
@ -1 +1 @@
|
||||||
2025-06-05T14:42:19+02:00
|
2025-06-06T07:34:16+02:00
|
||||||
|
|
|
||||||
|
|
@ -1 +1 @@
|
||||||
{"version":"0.9.2","created_at":"2025-06-05 14:42:19 +0200","results":[]}
|
{"version":"0.9.2","created_at":"2025-06-06 07:34:16 +0200","results":[{"type":"unpatched_gem","gem":{"name":"rack","version":"3.1.14"},"advisory":{"path":"/home/wiseadvice/.local/share/ruby-advisory-db/gems/rack/CVE-2025-49007.yml","id":"CVE-2025-49007","url":"https://github.com/rack/rack/security/advisories/GHSA-47m2-26rw-j2jw","title":"ReDoS Vulnerability in Rack::Multipart handle_mime_head","date":"2025-06-05","description":"### Summary\n\nThere is a denial of service vulnerability in the\nContent-Disposition parsing component of Rack. This is very\nsimilar to the previous security issue CVE-2022-44571.\n\n### Details\n\nCarefully crafted input can cause Content-Disposition header\nparsing in Rack to take an unexpected amount of time, possibly\nresulting in a denial of service attack vector. This header is\nused typically used in multipart parsing. Any applications that\nparse multipart posts using Rack (virtually all Rails applications)\nare impacted.\n\n### Credits\n\nThanks to [scyoon](https://hackerone.com/scyoon) for reporting\nthis to the Rails security team\n","cvss_v2":null,"cvss_v3":null,"cve":"2025-49007","osvdb":null,"ghsa":"47m2-26rw-j2jw","unaffected_versions":["< 3.1.0"],"patched_versions":[">= 3.1.16"],"criticality":null}}]}
|
||||||
11
report.txt
11
report.txt
|
|
@ -1 +1,10 @@
|
||||||
No vulnerabilities found
|
Name: rack
|
||||||
|
Version: 3.1.14
|
||||||
|
CVE: CVE-2025-49007
|
||||||
|
GHSA: GHSA-47m2-26rw-j2jw
|
||||||
|
Criticality: Unknown
|
||||||
|
URL: https://github.com/rack/rack/security/advisories/GHSA-47m2-26rw-j2jw
|
||||||
|
Title: ReDoS Vulnerability in Rack::Multipart handle_mime_head
|
||||||
|
Solution: update to '>= 3.1.16'
|
||||||
|
|
||||||
|
Vulnerabilities found!
|
||||||
|
|
|
||||||
|
|
@ -1,7 +1,14 @@
|
||||||
Updating ruby-advisory-db ...
|
Updating ruby-advisory-db ...
|
||||||
Already up to date.
|
Updating 85f55ec..8b57546
|
||||||
|
Fast-forward
|
||||||
|
gems/fluentd-ui/CVE-2020-21514.yml | 2 +-
|
||||||
|
gems/fluentd/CVE-2020-21514.yml | 18 ------------------
|
||||||
|
gems/rack/CVE-2025-49007.yml | 39 ++++++++++++++++++++++++++++++++++++++
|
||||||
|
3 files changed, 40 insertions(+), 19 deletions(-)
|
||||||
|
delete mode 100644 gems/fluentd/CVE-2020-21514.yml
|
||||||
|
create mode 100644 gems/rack/CVE-2025-49007.yml
|
||||||
Updated ruby-advisory-db
|
Updated ruby-advisory-db
|
||||||
ruby-advisory-db:
|
ruby-advisory-db:
|
||||||
advisories: 987 advisories
|
advisories: 987 advisories
|
||||||
last updated: 2025-05-28 12:22:04 -0700
|
last updated: 2025-06-05 22:15:09 -0700
|
||||||
commit: 85f55ec5e73dd2e2806cce136c5383ecf91fd0fe
|
commit: 8b57546c5a08c5f8709095db3ea2ce5784a76be4
|
||||||
|
|
|
||||||
Loading…
Reference in New Issue