Description
Rack is a modular Ruby web server interface. Prior to versions 2.2.23, 3.1.21, and 3.2.6, Rack::Files#fail sets the Content-Length response header using String#size instead of String#bytesize. When the response body contains multibyte UTF-8 characters, the declared Content-Length is smaller than the number of bytes actually sent on the wire. Because Rack::Files reflects the requested path in 404 responses, an attacker can trigger this mismatch by requesting a non-existent path containing percent-encoded UTF-8 characters. This results in incorrect HTTP response framing and may cause response desynchronization in deployments that rely on the incorrect Content-Length value. This issue has been patched in versions 2.2.23, 3.1.21, and 3.2.6.
Published: 2026-04-02
Score: 4.8 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Incorrect Content‑Length set in HTTP responses can cause framing errors and response desynchronization
Action: Apply patch
AI Analysis

Impact

Rack is a modular Ruby web server interface. In versions prior to 2.2.23, 3.1.21, and 3.2.6, Rack::Files#fail incorrectly calculates the Content‑Length header by using String#size instead of String#bytesize when the response body contains multibyte UTF‑8 characters. If an attacker requests a non‑existent path that includes percent‑encoded UTF‑8 characters, the resulting 404 response reflects the requested path and the faulty Content‑Length is used. The declared length is smaller than the actual number of bytes transmitted, which leads to incorrect HTTP framing and may create response desynchronization for downstream consumers that rely on the Content‑Length value.

Affected Systems

The affected product is Rack, a Ruby web server framework. Any release earlier than 2.2.23, 3.1.21, or 3.2.6 is vulnerable; the issue is identified by the rack:rack CPE.

Risk and Exploitability

The CVSS score of 4.8 indicates a moderate impact. No EPSS score is available and the vulnerability is not listed in the CISA KEV catalog. The likely attack vector is a remote HTTP request that targets the application; no local privilege escalation is required. Because exploitation only requires forging a URL with percent‑encoded UTF‑8 characters, the threat is limited to intentional response framing issues rather than data compromise or privilege gain.

Generated by OpenCVE AI on April 2, 2026 at 23:17 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Rack to version 2.2.23, 3.1.21, 3.2.6, or any later release

Generated by OpenCVE AI on April 2, 2026 at 23:17 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-q2ww-5357-x388 Rack has Content-Length mismatch in Rack::Files error responses
History

Sat, 04 Apr 2026 01:15:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

threat_severity

Moderate


Fri, 03 Apr 2026 19:00:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 03 Apr 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Rack
Rack rack
Vendors & Products Rack
Rack rack

Thu, 02 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
Description Rack is a modular Ruby web server interface. Prior to versions 2.2.23, 3.1.21, and 3.2.6, Rack::Files#fail sets the Content-Length response header using String#size instead of String#bytesize. When the response body contains multibyte UTF-8 characters, the declared Content-Length is smaller than the number of bytes actually sent on the wire. Because Rack::Files reflects the requested path in 404 responses, an attacker can trigger this mismatch by requesting a non-existent path containing percent-encoded UTF-8 characters. This results in incorrect HTTP response framing and may cause response desynchronization in deployments that rely on the incorrect Content-Length value. This issue has been patched in versions 2.2.23, 3.1.21, and 3.2.6.
Title Rack: Content-Length mismatch in Rack::Files error responses
Weaknesses CWE-130
CWE-135
References
Metrics cvssV3_1

{'score': 4.8, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-03T17:48:11.330Z

Reserved: 2026-03-30T20:52:53.284Z

Link: CVE-2026-34831

cve-icon Vulnrichment

Updated: 2026-04-03T17:48:07.125Z

cve-icon NVD

Status : Undergoing Analysis

Published: 2026-04-02T17:16:26.420

Modified: 2026-04-03T16:10:23.730

Link: CVE-2026-34831

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-04-02T16:43:08Z

Links: CVE-2026-34831 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-03T09:18:29Z

Weaknesses