CVE-2025-61771 (CNNVD-202510-1051)

HIGH
中文标题:
Rack 资源管理错误漏洞
英文标题:
Rack's multipart parser buffers large non‑file fields entirely in memory, enabling DoS (memory exhaustion)
CVSS分数: 7.5
发布时间: 2025-10-07 14:42:53
漏洞类型: 资源管理错误
状态: PUBLISHED
数据质量分数: 0.30
数据版本: v3
漏洞描述
中文描述:

Rack是Rack开源的一个模块化的Ruby web服务器界面。 Rack 2.2.19之前版本、3.1.17之前版本和3.2.2之前版本存在资源管理错误漏洞,该漏洞源于Rack::Multipart::Parser将非文件表单字段完全存储在内存中,可能导致内存耗尽和拒绝服务攻击。

英文描述:

Rack is a modular Ruby web server interface. In versions prior to 2.2.19, 3.1.17, and 3.2.2, ``Rack::Multipart::Parser` stores non-file form fields (parts without a `filename`) entirely in memory as Ruby `String` objects. A single large text field in a multipart/form-data request (hundreds of megabytes or more) can consume equivalent process memory, potentially leading to out-of-memory (OOM) conditions and denial of service (DoS). Attackers can send large non-file fields to trigger excessive memory usage. Impact scales with request size and concurrency, potentially leading to worker crashes or severe garbage-collection overhead. All Rack applications processing multipart form submissions are affected. Versions 2.2.19, 3.1.17, and 3.2.2 enforce a reasonable size cap for non-file fields (e.g., 2 MiB). Workarounds include restricting maximum request body size at the web-server or proxy layer (e.g., Nginx `client_max_body_size`) and validating and rejecting unusually large form fields at the application level.

CWE类型:
CWE-400
标签:
(暂无数据)
受影响产品
厂商 产品 版本 版本范围 平台 CPE
rack rack < 2.2.19 - - cpe:2.3:a:rack:rack:<_2.2.19:*:*:*:*:*:*:*
rack rack >= 3.1, < 3.1.17 - - cpe:2.3:a:rack:rack:>=_3.1,_<_3.1.17:*:*:*:*:*:*:*
rack rack >= 3.2, < 3.2.2 - - cpe:2.3:a:rack:rack:>=_3.2,_<_3.2.2:*:*:*:*:*:*:*
rack rack * - - cpe:2.3:a:rack:rack:*:*:*:*:*:ruby:*:*
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
https://github.com/rack/rack/security/advisories/GHSA-w9pc-fmgc-vxvw x_refsource_CONFIRM
cve.org
访问
https://github.com/rack/rack/commit/589127f4ac8b5cf11cf88fb0cd116ffed4d2181e x_refsource_MISC
cve.org
访问
https://github.com/rack/rack/commit/d869fed663b113b95a74ad53e1b5cae6ab31f29e x_refsource_MISC
cve.org
访问
https://github.com/rack/rack/commit/e08f78c656c9394d6737c022bde087e0f33336fd x_refsource_MISC
cve.org
访问
CVSS评分详情
3.1 (cna)
HIGH
7.5
CVSS向量: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
机密性
NONE
完整性
NONE
可用性
HIGH
时间信息
发布时间:
2025-10-07 14:42:53
修改时间:
2025-10-07 17:52:09
创建时间:
2025-11-11 15:40:48
更新时间:
2025-11-11 16:00:15
利用信息
暂无可利用代码信息
数据源详情
数据源 记录ID 版本 提取时间
CVE cve_CVE-2025-61771 2025-11-11 15:23:33 2025-11-11 07:40:48
NVD nvd_CVE-2025-61771 2025-11-11 15:01:05 2025-11-11 07:48:35
CNNVD cnnvd_CNNVD-202510-1051 2025-11-11 15:12:28 2025-11-11 08:00:15
版本与语言
当前版本: v3
主要语言: EN
支持语言:
EN ZH
安全公告
暂无安全公告信息
变更历史
v3 CNNVD
2025-11-11 16:00:15
vulnerability_type: 未提取 → 资源管理错误; cnnvd_id: 未提取 → CNNVD-202510-1051; data_sources: ['cve', 'nvd'] → ['cnnvd', 'cve', 'nvd']
查看详细变更
  • vulnerability_type: 未提取 -> 资源管理错误
  • cnnvd_id: 未提取 -> CNNVD-202510-1051
  • data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
v2 NVD
2025-11-11 15:48:35
affected_products_count: 3 → 4; data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
  • affected_products_count: 3 -> 4
  • data_sources: ['cve'] -> ['cve', 'nvd']