Ruby RACK < 2.2.20 / 3.x < 3.1.18 / 3.2 < 3.2.3 Multiple Vulnerabilities

high Nessus Plugin ID 270698

Synopsis

The remote host has an application installed that is affected by DoS vulnerability.

Description

The version of the RACK Ruby library installed on the remote host is prior to 2.2.20 / 3.1.18 / 3.2.3. It is, therefore, affected by the following vulnerabilities:

- Rack::Request#POST reads the entire request body into memory for Content-Type: application/x-www-form-urlencoded, calling rack.input.read(nil) without enforcing a length or cap. Large request bodies can therefore be buffered completely into process memory before parsing, leading to denial of service (DoS) through memory exhaustion. (CVE-2025-61919)

- A possible information disclosure vulnerability existed in Rack::Sendfile when running behind a proxy that supports x-sendfile headers (such as Nginx). Specially crafted headers could cause Rack::Sendfile to miscommunicate with the proxy and trigger unintended internal requests, potentially bypassing proxy-level access restrictions. (CVE-2025-61780)

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Upgrade to RACK version 2.2.20 / 3.1.18 / 3.2.3 or later.

See Also

https://github.com/rack/rack/security/advisories/GHSA-r657-rxjc-j557

https://github.com/rack/rack/security/advisories/GHSA-6xw4-3v39-52mm

Plugin Details

Severity: High

ID: 270698

File Name: ruby_gem_rack_3_2_3.nasl

Version: 1.2

Type: local

Agent: windows, macosx, unix

Family: Misc.

Published: 10/17/2025

Updated: 10/17/2025

Configuration: Enable thorough checks (optional)

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.4

CVSS v2

Risk Factor: High

Base Score: 7.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C

CVSS Score Source: CVE-2025-61919

CVSS v3

Risk Factor: High

Base Score: 7.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Vulnerability Information

CPE: cpe:/a:ruby:rack

Required KB Items: Host/nix/packages, Host/ruby/modules/enumerated

Patch Publication Date: 10/10/2025

Vulnerability Publication Date: 10/10/2025

Reference Information

CVE: CVE-2025-46727, CVE-2025-61919

IAVB: 2025-B-0171