$2,400 Bounty: for Discovering Critical DoS Vulnerability in Rack (CVE-2022–30122)
嗯,用户让我总结一篇文章的内容,控制在100字以内,而且不需要特定的开头。首先,我得仔细阅读文章内容,抓住关键点。 文章讲的是Rack组件中的一个ReDoS漏洞,影响了Ruby的Web应用。Rack是Ruby应用的核心部分,处理HTTP请求和响应。这个漏洞具体是在处理多部分数据时的正则表达式问题,导致服务器容易被攻击者利用,发送恶意请求让服务器崩溃或变慢。 用户可能需要一个简洁明了的总结,用于快速了解问题。所以我要把Rack的作用、漏洞类型、影响以及具体位置都涵盖进去。 最后,确保语言简洁,不超过100字,并且直接描述内容,不使用“文章总结”之类的开头。 </think> Rack组件中的ReDoS漏洞(CVE-2022–30122)使Ruby Web应用易受拒绝服务攻击。该漏洞源于其多部分解析器中的正则表达式问题,允许攻击者通过精心构造的HTTP请求使服务器瘫痪或变慢。 2025-12-29 06:7:23 Author: infosecwriteups.com(查看原文) 阅读量:4 收藏

How a ReDoS Flaw in Rack’s Multipart Parser Put Ruby Web Applications at Risk of Easy Denial-of-Service Attacks

Monika sharma

Press enter or click to view image in full size

While reviewing HackerOne reports on open-source infrastructure, I came across an intriguing submission (#1627159). What caught my attention was a classic yet impactful Regular Expression Denial of Service (ReDoS) vulnerability in Rack. The flaw, tracked as CVE-2022–30122, allowed attackers to slow down or crash servers with specially crafted HTTP requests

What is Rack?

Rack provides a minimal, modular interface between web servers and Ruby web frameworks. It is a core component of nearly all Ruby web applications, handling HTTP requests and responses. Popular frameworks like Ruby on Rails, Sinatra and many others depend on Rack for essential functionality, such as parsing incoming data.

The Vulnerability: ReDoS in Multipart Parsing

The issue stemmed from a Regular Expression Denial of Service (ReDoS) flaw in Rack’s multipart parser, specifically in the constants Rack::Multipart::BROKEN_QUOTED and Rack::Multipart::BROKEN_UNQUOTED.


文章来源: https://infosecwriteups.com/2-400-bounty-for-discovering-critical-dos-vulnerability-in-rack-cve-2022-30122-26b8f0d9e484?source=rss----7b722bfd1b8d--bug_bounty
如有侵权请联系:admin#unsafe.sh