Description
Rack is a modular Ruby web server interface. Prior to versions 2.2.23, 3.1.21, and 3.2.6, Rack::Utils.get_byte_ranges parses the HTTP Range header without limiting the number of individual byte ranges. Although the existing fix for CVE-2024-26141 rejects ranges whose total byte coverage exceeds the file size, it does not restrict the count of ranges. An attacker can supply many small overlapping ranges such as 0-0,0-0,0-0,... to trigger disproportionate CPU, memory, I/O, and bandwidth consumption per request. This results in a denial of service condition in Rack file-serving paths that process multipart byte range responses. This issue has been patched in versions 2.2.23, 3.1.21, and 3.2.6.
Published: 2026-04-02
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service
Action: Apply Patch
AI Analysis

Impact

The vulnerability resides in Rack::Utils.get_byte_ranges, which parses the HTTP Range header without limiting the number of byte ranges. An attacker can supply an arbitrary number of overlapping ranges such as 0-0,0-0,0-0,…, causing the server to consume excessive CPU, memory, I/O, and bandwidth while processing the request. This behavior results in a denial of service on Rack file‑serving paths that handle multipart range responses. The weakness corresponds to CWE‑400 (Uncontrolled Resource Consumption) and CWE‑770 (Allocation of Excessively Large Amount of Memory). The impact is a degradation or complete loss of service for the affected web application; there is no direct compromise of data confidentiality or integrity.

Affected Systems

Rack versions prior to 2.2.23, 3.1.21, and 3.2.6 are affected. Any Ruby application or web server that uses the Rack interface and relies on those versions is at risk. The issue is mitigated in the listed patched releases. No other vendors or products are enumerated beyond Rack; but any service that packages Rack under older versions would also be vulnerable.

Risk and Exploitability

The CVSS base score is 5.3, indicating a moderate severity vulnerability. No EPSS score is available, and the vulnerability is not currently listed in the CISA KEV catalog. The attack can be executed remotely by crafting an HTTP request with a specially formed Range header, without authentication or elevated privileges. Because the vulnerability is triggered by high traffic of range requests, a determined attacker could impact high‑traffic servers, potentially exhausting resources and rendering the application unavailable.

Generated by OpenCVE AI on April 2, 2026 at 22:35 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Rack to a fixed version (2.2.23, 3.1.21, or 3.2.6).
  • If upgrade is not immediately possible, disable or block HTTP Range header handling or limit byte ranges within the application.
  • Monitor the server for unusually high CPU or memory usage when serving requests with Range headers.

Generated by OpenCVE AI on April 2, 2026 at 22:35 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-x8cg-fq8g-mxfx Rack's multipart byte range processing allows denial of service via excessive overlapping ranges
History

Fri, 03 Apr 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Rack
Rack rack
Vendors & Products Rack
Rack rack

Thu, 02 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
Description Rack is a modular Ruby web server interface. Prior to versions 2.2.23, 3.1.21, and 3.2.6, Rack::Utils.get_byte_ranges parses the HTTP Range header without limiting the number of individual byte ranges. Although the existing fix for CVE-2024-26141 rejects ranges whose total byte coverage exceeds the file size, it does not restrict the count of ranges. An attacker can supply many small overlapping ranges such as 0-0,0-0,0-0,... to trigger disproportionate CPU, memory, I/O, and bandwidth consumption per request. This results in a denial of service condition in Rack file-serving paths that process multipart byte range responses. This issue has been patched in versions 2.2.23, 3.1.21, and 3.2.6.
Title Rack: Unbounded Range Count in get_byte_ranges Enables DoS
Weaknesses CWE-400
CWE-770
References
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-03T18:13:27.375Z

Reserved: 2026-03-30T20:52:53.283Z

Link: CVE-2026-34826

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Undergoing Analysis

Published: 2026-04-02T17:16:25.880

Modified: 2026-04-03T16:10:23.730

Link: CVE-2026-34826

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-03T09:18:24Z

Weaknesses