Metrics
Affected Vendors & Products
Source | ID | Title |
---|---|---|
![]() |
GHSA-wpv5-97wm-hp9c | Rack's multipart parser buffers unbounded per-part headers, enabling DoS (memory exhaustion) |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 08 Oct 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Rack
Rack rack |
|
Vendors & Products |
Rack
Rack rack |
Wed, 08 Oct 2025 00:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
threat_severity
|
threat_severity
|
Tue, 07 Oct 2025 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 07 Oct 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Rack is a modular Ruby web server interface. In versions prior to 2.2.19, 3.1.17, and 3.2.2, `Rack::Multipart::Parser` can accumulate unbounded data when a multipart part’s header block never terminates with the required blank line (`CRLFCRLF`). The parser keeps appending incoming bytes to memory without a size cap, allowing a remote attacker to exhaust memory and cause a denial of service (DoS). Attackers can send incomplete multipart headers to trigger high memory use, leading to process termination (OOM) or severe slowdown. The effect scales with request size limits and concurrency. All applications handling multipart uploads may be affected. Versions 2.2.19, 3.1.17, and 3.2.2 cap per-part header size (e.g., 64 KiB). As a workaround, restrict maximum request sizes at the proxy or web server layer (e.g., Nginx `client_max_body_size`). | |
Title | Rack's multipart parser buffers unbounded per-part headers, enabling DoS (memory exhaustion) | |
Weaknesses | CWE-400 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-10-07T17:51:26.246Z
Reserved: 2025-09-30T19:43:49.901Z
Link: CVE-2025-61772

Updated: 2025-10-07T17:51:23.125Z

Status : Awaiting Analysis
Published: 2025-10-07T15:16:03.280
Modified: 2025-10-08T19:38:32.610
Link: CVE-2025-61772


Updated: 2025-10-08T13:36:24Z