
Cloud Vulnerability DB
A community-led vulnerabilities database
A denial of service vulnerability was discovered in the multipart parsing component of Rack, identified as CVE-2022-44572. The vulnerability affects multiple versions of Rack and was fixed in versions 2.0.9.2, 2.1.4.2, 2.2.4.1, and 3.0.0.1. The issue stems from improper structure of regular expressions in the multipart parsing component (Ubuntu Security, NVD).
The vulnerability is caused by a regular expression denial of service (ReDoS) in the multipart parsing component. When processing multipart POST requests, the vulnerability could result in uncontrolled resource consumption if an application using Rack receives specially crafted input. The vulnerability has received a CVSS score of 7.5 (HIGH) with a vector of CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H (NetApp Security).
If successfully exploited, this vulnerability could allow a remote attacker to cause a denial of service condition. The impact occurs when an application using Rack to parse multipart posts receives specially crafted input, leading to uncontrolled resource consumption (Ubuntu Security).
The vulnerability has been fixed in Rack versions 2.0.9.2, 2.1.4.2, 2.2.4.1, and 3.0.0.1. Users are advised to update their systems to these patched versions. After updating, any applications using Rack need to be restarted to apply the necessary changes (Ubuntu Security).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."