Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 955663 (CVE-2025-46727) - <dev-ruby/rack-{2.2.14:2.2,3.0.16:3.0,3.1.14:3.1}: Denial of Service
Summary: <dev-ruby/rack-{2.2.14:2.2,3.0.16:3.0,3.1.14:3.1}: Denial of Service
Status: CONFIRMED
Alias: CVE-2025-46727
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal normal
Assignee: Gentoo Security
URL: https://github.com/rack/rack/security...
Whiteboard: B3 [stable]
Keywords:
Depends on: 955665
Blocks:
  Show dependency tree
 
Reported: 2025-05-09 07:51 UTC by Hans de Graaff
Modified: 2025-06-10 06:11 UTC (History)
2 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Hans de Graaff gentoo-dev Security 2025-05-09 07:51:55 UTC
Summary

Rack::QueryParser parses query strings and application/x-www-form-urlencoded bodies into Ruby data structures without imposing any limit on the number of parameters, allowing attackers to send requests with extremely large numbers of parameters.
Details

The vulnerability arises because Rack::QueryParser iterates over each &-separated key-value pair and adds it to a Hash without enforcing an upper bound on the total number of parameters. This allows an attacker to send a single request containing hundreds of thousands (or more) of parameters, which consumes excessive memory and CPU during parsing.
Impact

An attacker can trigger denial of service by sending specifically crafted HTTP requests, which can cause memory exhaustion or pin CPU resources, stalling or crashing the Rack server. This results in full service disruption until the affected worker is restarted.
Comment 1 Helen Grace 2025-05-26 08:56:46 UTC
This kind of vulnerability highlights the importance of input validation at every level. For anyone looking to mitigate the issue while waiting for upstream patches, I recommend using middleware or web server settings to limit parameter count. https://speedstarsgame.io