CVE-2025-49007

NameCVE-2025-49007
DescriptionRack is a modular Ruby web server interface. Starting in version 3.1.0 and prior to version 3.1.16, there is a denial of service vulnerability in the Content-Disposition parsing component of Rack. This is very similar to the previous security issue CVE-2022-44571. Carefully crafted input can cause Content-Disposition header parsing in Rack to take an unexpected amount of time, possibly resulting in a denial of service attack vector. This header is used typically used in multipart parsing. Any applications that parse multipart posts using Rack (virtually all Rails applications) are impacted. Version 3.1.16 contains a patch for the vulnerability.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs1107363

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
ruby-rack (PTS)bullseye2.1.4-3+deb11u2fixed
bullseye (security)2.1.4-3+deb11u3fixed
bookworm, bookworm (security)2.2.13-1~deb12u1fixed
sid, trixie3.1.12-1vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
ruby-racksourcebullseye(not affected)
ruby-racksourcebookworm(not affected)
ruby-racksource(unstable)(unfixed)1107363

Notes

[bookworm] - ruby-rack <not-affected> (Introduced in 3.1.0)
[bullseye] - ruby-rack <not-affected> (Introduced in 3.1.0)
https://github.com/rack/rack/security/advisories/GHSA-47m2-26rw-j2jw
https://github.com/rack/rack/commit/4795831a0a310c2d31102749e551b38faab6401f (main)
https://github.com/rack/rack/commit/aed514df37e33907df3c971ed3ca9a0a20ac2901 (v3.1.16)

Search for package or bug name: Reporting problems