Lookup for vulnerabilities affecting packages.
| Vulnerability_id | VCID-stpq-7qys-t3cf |
| Summary | Rack ReDoS Vulnerability in HTTP Accept Headers Parsing
### Summary
A Regular Expression Denial of Service (ReDoS) vulnerability exists in the `Rack::Request::Helpers` module when parsing HTTP Accept headers. This vulnerability can be exploited by an attacker sending specially crafted `Accept-Encoding` or `Accept-Language` headers, causing the server to spend excessive time processing the request and leading to a Denial of Service (DoS).
### Details
The fix for https://github.com/rack/rack/security/advisories/GHSA-54rr-7fvw-6x8f was not applied to the main branch and thus while the issue was fixed for the Rack v3.0 release series, it was not fixed in the v3.1 release series until v3.1.5. |
| Aliases |
| 0 |
|
| 1 |
| alias |
GHSA-cj83-2ww7-mvq7 |
|
|
| Fixed_packages |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
| url |
pkg:gem/rack@3.1.5 |
| purl |
pkg:gem/rack@3.1.5 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-47ja-djzb-2bbw |
|
| 1 |
| vulnerability |
VCID-7p12-ejdu-uqgy |
|
| 2 |
| vulnerability |
VCID-7wvj-9h3p-23am |
|
| 3 |
| vulnerability |
VCID-9rpp-9xss-duf6 |
|
| 4 |
| vulnerability |
VCID-azu5-jcmd-3ufx |
|
| 5 |
| vulnerability |
VCID-c5sc-7qnn-mkb9 |
|
| 6 |
| vulnerability |
VCID-d58r-22kr-9bct |
|
| 7 |
| vulnerability |
VCID-npag-sz7d-v7b6 |
|
| 8 |
| vulnerability |
VCID-s971-gkdg-jkhc |
|
| 9 |
| vulnerability |
VCID-skxv-7he3-xqgc |
|
| 10 |
| vulnerability |
VCID-w732-52bx-2qf8 |
|
| 11 |
| vulnerability |
VCID-wt7k-s1yd-nke6 |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:gem/rack@3.1.5 |
|
|
| Affected_packages |
| 0 |
| url |
pkg:gem/rack@3.1.0 |
| purl |
pkg:gem/rack@3.1.0 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-47ja-djzb-2bbw |
|
| 1 |
| vulnerability |
VCID-7p12-ejdu-uqgy |
|
| 2 |
| vulnerability |
VCID-7wvj-9h3p-23am |
|
| 3 |
| vulnerability |
VCID-9rpp-9xss-duf6 |
|
| 4 |
| vulnerability |
VCID-azu5-jcmd-3ufx |
|
| 5 |
| vulnerability |
VCID-c5sc-7qnn-mkb9 |
|
| 6 |
| vulnerability |
VCID-d58r-22kr-9bct |
|
| 7 |
| vulnerability |
VCID-npag-sz7d-v7b6 |
|
| 8 |
| vulnerability |
VCID-s971-gkdg-jkhc |
|
| 9 |
| vulnerability |
VCID-skxv-7he3-xqgc |
|
| 10 |
| vulnerability |
VCID-stpq-7qys-t3cf |
|
| 11 |
| vulnerability |
VCID-w732-52bx-2qf8 |
|
| 12 |
| vulnerability |
VCID-wt7k-s1yd-nke6 |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:gem/rack@3.1.0 |
|
| 1 |
| url |
pkg:gem/rack@3.1.1 |
| purl |
pkg:gem/rack@3.1.1 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-47ja-djzb-2bbw |
|
| 1 |
| vulnerability |
VCID-7p12-ejdu-uqgy |
|
| 2 |
| vulnerability |
VCID-7wvj-9h3p-23am |
|
| 3 |
| vulnerability |
VCID-9rpp-9xss-duf6 |
|
| 4 |
| vulnerability |
VCID-azu5-jcmd-3ufx |
|
| 5 |
| vulnerability |
VCID-c5sc-7qnn-mkb9 |
|
| 6 |
| vulnerability |
VCID-d58r-22kr-9bct |
|
| 7 |
| vulnerability |
VCID-npag-sz7d-v7b6 |
|
| 8 |
| vulnerability |
VCID-s971-gkdg-jkhc |
|
| 9 |
| vulnerability |
VCID-skxv-7he3-xqgc |
|
| 10 |
| vulnerability |
VCID-stpq-7qys-t3cf |
|
| 11 |
| vulnerability |
VCID-w732-52bx-2qf8 |
|
| 12 |
| vulnerability |
VCID-wt7k-s1yd-nke6 |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:gem/rack@3.1.1 |
|
| 2 |
| url |
pkg:gem/rack@3.1.2 |
| purl |
pkg:gem/rack@3.1.2 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-47ja-djzb-2bbw |
|
| 1 |
| vulnerability |
VCID-7p12-ejdu-uqgy |
|
| 2 |
| vulnerability |
VCID-7wvj-9h3p-23am |
|
| 3 |
| vulnerability |
VCID-9rpp-9xss-duf6 |
|
| 4 |
| vulnerability |
VCID-azu5-jcmd-3ufx |
|
| 5 |
| vulnerability |
VCID-c5sc-7qnn-mkb9 |
|
| 6 |
| vulnerability |
VCID-d58r-22kr-9bct |
|
| 7 |
| vulnerability |
VCID-npag-sz7d-v7b6 |
|
| 8 |
| vulnerability |
VCID-s971-gkdg-jkhc |
|
| 9 |
| vulnerability |
VCID-skxv-7he3-xqgc |
|
| 10 |
| vulnerability |
VCID-stpq-7qys-t3cf |
|
| 11 |
| vulnerability |
VCID-w732-52bx-2qf8 |
|
| 12 |
| vulnerability |
VCID-wt7k-s1yd-nke6 |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:gem/rack@3.1.2 |
|
| 3 |
| url |
pkg:gem/rack@3.1.3 |
| purl |
pkg:gem/rack@3.1.3 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-47ja-djzb-2bbw |
|
| 1 |
| vulnerability |
VCID-7p12-ejdu-uqgy |
|
| 2 |
| vulnerability |
VCID-7wvj-9h3p-23am |
|
| 3 |
| vulnerability |
VCID-9rpp-9xss-duf6 |
|
| 4 |
| vulnerability |
VCID-azu5-jcmd-3ufx |
|
| 5 |
| vulnerability |
VCID-c5sc-7qnn-mkb9 |
|
| 6 |
| vulnerability |
VCID-d58r-22kr-9bct |
|
| 7 |
| vulnerability |
VCID-npag-sz7d-v7b6 |
|
| 8 |
| vulnerability |
VCID-s971-gkdg-jkhc |
|
| 9 |
| vulnerability |
VCID-skxv-7he3-xqgc |
|
| 10 |
| vulnerability |
VCID-stpq-7qys-t3cf |
|
| 11 |
| vulnerability |
VCID-w732-52bx-2qf8 |
|
| 12 |
| vulnerability |
VCID-wt7k-s1yd-nke6 |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:gem/rack@3.1.3 |
|
| 4 |
| url |
pkg:gem/rack@3.1.4 |
| purl |
pkg:gem/rack@3.1.4 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-47ja-djzb-2bbw |
|
| 1 |
| vulnerability |
VCID-7p12-ejdu-uqgy |
|
| 2 |
| vulnerability |
VCID-7wvj-9h3p-23am |
|
| 3 |
| vulnerability |
VCID-9rpp-9xss-duf6 |
|
| 4 |
| vulnerability |
VCID-azu5-jcmd-3ufx |
|
| 5 |
| vulnerability |
VCID-c5sc-7qnn-mkb9 |
|
| 6 |
| vulnerability |
VCID-d58r-22kr-9bct |
|
| 7 |
| vulnerability |
VCID-npag-sz7d-v7b6 |
|
| 8 |
| vulnerability |
VCID-s971-gkdg-jkhc |
|
| 9 |
| vulnerability |
VCID-skxv-7he3-xqgc |
|
| 10 |
| vulnerability |
VCID-stpq-7qys-t3cf |
|
| 11 |
| vulnerability |
VCID-w732-52bx-2qf8 |
|
| 12 |
| vulnerability |
VCID-wt7k-s1yd-nke6 |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:gem/rack@3.1.4 |
|
|
| References |
| 0 |
| reference_url |
https://advisory.dw1.io/61 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
6.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
|
| 1 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://advisory.dw1.io/61 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-39316 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00833 |
| scoring_system |
epss |
| scoring_elements |
0.74588 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.00833 |
| scoring_system |
epss |
| scoring_elements |
0.74597 |
| published_at |
2026-04-12T12:55:00Z |
|
| 2 |
| value |
0.00833 |
| scoring_system |
epss |
| scoring_elements |
0.74617 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.00833 |
| scoring_system |
epss |
| scoring_elements |
0.74546 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.00833 |
| scoring_system |
epss |
| scoring_elements |
0.74579 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00833 |
| scoring_system |
epss |
| scoring_elements |
0.74547 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.00833 |
| scoring_system |
epss |
| scoring_elements |
0.74572 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.00833 |
| scoring_system |
epss |
| scoring_elements |
0.74594 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.00833 |
| scoring_system |
epss |
| scoring_elements |
0.74626 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-39316 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| Weaknesses |
| 0 |
| cwe_id |
1333 |
| name |
Inefficient Regular Expression Complexity |
| description |
The product uses a regular expression with an inefficient, possibly exponential worst-case computational complexity that consumes excessive CPU cycles. |
|
| 1 |
| cwe_id |
937 |
| name |
OWASP Top Ten 2013 Category A9 - Using Components with Known Vulnerabilities |
| description |
Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2013. |
|
| 2 |
| cwe_id |
1035 |
| name |
OWASP Top Ten 2017 Category A9 - Using Components with Known Vulnerabilities |
| description |
Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2017. |
|
|
| Exploits |
|
| Severity_range_score | 4.0 - 6.9 |
| Exploitability | 0.5 |
| Weighted_severity | 6.2 |
| Risk_score | 3.1 |
| Resource_url | http://public2.vulnerablecode.io/vulnerabilities/VCID-stpq-7qys-t3cf |