$2,400 Bounty: for Discovering Critical DoS Vulnerability in Rack (CVE-2022–30122)
好的,我现在需要帮用户总结一篇文章的内容,控制在100个字以内。首先,我得仔细阅读用户提供的文章内容,理解其主要信息。 文章讲的是Rack组件中的一个ReDoS漏洞,影响了Ruby的Web应用。ReDoS是一种利用正则表达式导致服务器瘫痪的攻击方式。这个漏洞存在于Rack的多部分解析器中,具体是在BROKEN_QUOTED和BROKEN_UNQUOTED常量里。攻击者可以发送特制的HTTP请求,让服务器变慢甚至崩溃。 接下来,我需要提取关键点:Rack是Ruby应用的核心组件,用于处理HTTP请求;漏洞是ReDoS类型;影响范围包括Rails、Sinatra等框架;攻击方式是发送特定请求。 现在要将这些信息浓缩到100字以内,确保涵盖所有重要细节。同时,不需要使用“文章内容总结”之类的开头,直接描述即可。 最后,检查字数是否符合要求,并确保语句通顺、信息准确。 </think> Rack组件中的ReDoS漏洞(CVE-2022–30122)导致Ruby Web应用易受拒绝服务攻击。该漏洞源于Rack多部分解析器中的正则表达式问题,攻击者可通过精心构造的HTTP请求使服务器变慢或崩溃。 2025-12-29 06:7:23 Author: infosecwriteups.com(查看原文) 阅读量:4 收藏

How a ReDoS Flaw in Rack’s Multipart Parser Put Ruby Web Applications at Risk of Easy Denial-of-Service Attacks

Monika sharma

Press enter or click to view image in full size

While reviewing HackerOne reports on open-source infrastructure, I came across an intriguing submission (#1627159). What caught my attention was a classic yet impactful Regular Expression Denial of Service (ReDoS) vulnerability in Rack. The flaw, tracked as CVE-2022–30122, allowed attackers to slow down or crash servers with specially crafted HTTP requests

What is Rack?

Rack provides a minimal, modular interface between web servers and Ruby web frameworks. It is a core component of nearly all Ruby web applications, handling HTTP requests and responses. Popular frameworks like Ruby on Rails, Sinatra and many others depend on Rack for essential functionality, such as parsing incoming data.

The Vulnerability: ReDoS in Multipart Parsing

The issue stemmed from a Regular Expression Denial of Service (ReDoS) flaw in Rack’s multipart parser, specifically in the constants Rack::Multipart::BROKEN_QUOTED and Rack::Multipart::BROKEN_UNQUOTED.


文章来源: https://infosecwriteups.com/2-400-bounty-for-discovering-critical-dos-vulnerability-in-rack-cve-2022-30122-26b8f0d9e484?source=rss----7b722bfd1b8d---4
如有侵权请联系:admin#unsafe.sh