3
0
Fork 0

commit by to_remotes 2025-06-16 11:28:20 +0200 from cicd

main
cicd 2025-06-16 11:28:20 +02:00
parent 7896d0cd77
commit 8089b4a957
3 changed files with 3 additions and 12 deletions

View File

@ -1 +1 @@
2025-06-16T11:27:51+02:00 2025-06-16T11:28:19+02:00

View File

@ -1 +1 @@
{"version":"0.9.2","created_at":"2025-06-16 11:27:51 +0200","results":[{"type":"unpatched_gem","gem":{"name":"rack","version":"3.1.14"},"advisory":{"path":"/home/wiseadvice/.local/share/ruby-advisory-db/gems/rack/CVE-2025-49007.yml","id":"CVE-2025-49007","url":"https://github.com/rack/rack/security/advisories/GHSA-47m2-26rw-j2jw","title":"ReDoS Vulnerability in Rack::Multipart handle_mime_head","date":"2025-06-05","description":"### Summary\n\nThere is a denial of service vulnerability in the\nContent-Disposition parsing component of Rack. This is very\nsimilar to the previous security issue CVE-2022-44571.\n\n### Details\n\nCarefully crafted input can cause Content-Disposition header\nparsing in Rack to take an unexpected amount of time, possibly\nresulting in a denial of service attack vector. This header is\nused typically used in multipart parsing. Any applications that\nparse multipart posts using Rack (virtually all Rails applications)\nare impacted.\n\n### Credits\n\nThanks to [scyoon](https://hackerone.com/scyoon) for reporting\nthis to the Rails security team\n","cvss_v2":null,"cvss_v3":null,"cve":"2025-49007","osvdb":null,"ghsa":"47m2-26rw-j2jw","unaffected_versions":["< 3.1.0"],"patched_versions":[">= 3.1.16"],"criticality":null}}]} {"version":"0.9.2","created_at":"2025-06-16 11:28:19 +0200","results":[]}

View File

@ -1,10 +1 @@
Name: rack No vulnerabilities found
Version: 3.1.14
CVE: CVE-2025-49007
GHSA: GHSA-47m2-26rw-j2jw
Criticality: Unknown
URL: https://github.com/rack/rack/security/advisories/GHSA-47m2-26rw-j2jw
Title: ReDoS Vulnerability in Rack::Multipart handle_mime_head
Solution: update to '>= 3.1.16'
Vulnerabilities found!