{
  "threat_severity" : "Moderate",
  "public_date" : "2023-01-20T00:00:00Z",
  "bugzilla" : {
    "description" : "rubygem-rack: denial of service in Content-Disposition parsing",
    "id" : "2164714",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2164714"
  },
  "cvss3" : {
    "cvss3_base_score" : "7.5",
    "cvss3_scoring_vector" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
    "status" : "verified"
  },
  "cwe" : "CWE-1333",
  "details" : [ "There is a denial of service vulnerability in the Content-Disposition parsingcomponent of Rack fixed in 2.0.9.2, 2.1.4.2, 2.2.4.1, 3.0.0.1. This could allow an attacker to craft an input that can cause Content-Disposition header parsing in Rackto take an unexpected amount of time, possibly resulting in a denial ofservice attack vector. This header is used typically used in multipartparsing. Any applications that parse multipart posts using Rack (virtuallyall Rails applications) are impacted.", "A flaw was found in rubygem-rack. Rack is vulnerable to a denial of service caused by a regular expression denial of service (ReDoS) flaw in the multipart parser. By sending a specially-crafted regex input, a remote attacker can cause a denial of service." ],
  "affected_release" : [ {
    "product_name" : "Red Hat Satellite 6.14 for RHEL 8",
    "release_date" : "2023-11-08T00:00:00Z",
    "advisory" : "RHSA-2023:6818",
    "cpe" : "cpe:/a:redhat:satellite:6.14::el8",
    "package" : "rubygem-rack-0:2.2.7-1.el8sat"
  }, {
    "product_name" : "Red Hat Satellite 6.14 for RHEL 8",
    "release_date" : "2023-11-08T00:00:00Z",
    "advisory" : "RHSA-2023:6818",
    "cpe" : "cpe:/a:redhat:satellite_capsule:6.14::el8",
    "package" : "rubygem-rack-0:2.2.7-1.el8sat"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2022-44571\nhttps://nvd.nist.gov/vuln/detail/CVE-2022-44571\nhttps://github.com/rubysec/ruby-advisory-db/tree/master/gems/rack/CVE-2022-44571.yml" ],
  "name" : "CVE-2022-44571",
  "csaw" : false
}