-
Byte Open Security
(ByteOS Network)
Log In
Sign Up
NVD Vulnerability Details :
CVE-2023-27539
Analyzed
More Info
Official Page
Source
-
support@hackerone.com
View Known Exploited Vulnerability (KEV) details
Published At
-
09 Jan, 2025 | 01:15
Updated At
-
10 Oct, 2025 | 16:31
There is a denial of service vulnerability in the header parsing component of Rack.
CISA Catalog
Date Added
Due Date
Vulnerability Name
Required Action
N/A
Date Added:
N/A
Due Date:
N/A
Vulnerability Name:
N/A
Required Action:
N/A
Metrics
Type
Version
Base score
Base severity
Vector
Primary
3.1
5.3
MEDIUM
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
Secondary
3.1
5.3
MEDIUM
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Type:
Primary
Version:
3.1
Base score:
5.3
Base severity:
MEDIUM
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
Type:
Secondary
Version:
3.1
Base score:
5.3
Base severity:
MEDIUM
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
CPE Matches
rack
rack
>>
rack
>>
Versions from 2.0.0(inclusive) to 2.2.6.4(exclusive)
cpe:2.3:a:rack:rack:*:*:*:*:*:ruby:*:*
rack
rack
>>
rack
>>
Versions from 3.0.0(inclusive) to 3.0.6.1(exclusive)
cpe:2.3:a:rack:rack:*:*:*:*:*:ruby:*:*
Debian GNU/Linux
debian
>>
debian_linux
>>
10.0
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
Debian GNU/Linux
debian
>>
debian_linux
>>
11.0
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
Load More
Weaknesses
CWE ID
Type
Source
NVD-CWE-noinfo
Primary
nvd@nist.gov
CWE ID:
NVD-CWE-noinfo
Type:
Primary
Source:
nvd@nist.gov
Evaluator Description
Evaluator Impact
Evaluator Solution
Vendor Statements
References
Hyperlink
Source
Resource
https://discuss.rubyonrails.org/t/cve-2023-27539-possible-denial-of-service-vulnerability-in-racks-header-parsing/82466
support@hackerone.com
Vendor Advisory
https://github.com/advisories/GHSA-c6qg-cjj8-47qp
support@hackerone.com
Third Party Advisory
Patch
https://github.com/rack/rack/commit/231ef369ad0b542575fb36c74fcfcfabcf6c530c
support@hackerone.com
Patch
https://github.com/rack/rack/commit/ee7919ea04303717858be1c3f16b406adc6d8cff
support@hackerone.com
Patch
https://lists.debian.org/debian-lts-announce/2023/04/msg00017.html
support@hackerone.com
Mailing List
Third Party Advisory
https://security.netapp.com/advisory/ntap-20231208-0016/
support@hackerone.com
Third Party Advisory
https://www.debian.org/security/2023/dsa-5530
support@hackerone.com
Mailing List
Third Party Advisory
Hyperlink:
https://discuss.rubyonrails.org/t/cve-2023-27539-possible-denial-of-service-vulnerability-in-racks-header-parsing/82466
Source:
support@hackerone.com
Resource:
Vendor Advisory
Hyperlink:
https://github.com/advisories/GHSA-c6qg-cjj8-47qp
Source:
support@hackerone.com
Resource:
Third Party Advisory
Patch
Hyperlink:
https://github.com/rack/rack/commit/231ef369ad0b542575fb36c74fcfcfabcf6c530c
Source:
support@hackerone.com
Resource:
Patch
Hyperlink:
https://github.com/rack/rack/commit/ee7919ea04303717858be1c3f16b406adc6d8cff
Source:
support@hackerone.com
Resource:
Patch
Hyperlink:
https://lists.debian.org/debian-lts-announce/2023/04/msg00017.html
Source:
support@hackerone.com
Resource:
Mailing List
Third Party Advisory
Hyperlink:
https://security.netapp.com/advisory/ntap-20231208-0016/
Source:
support@hackerone.com
Resource:
Third Party Advisory
Hyperlink:
https://www.debian.org/security/2023/dsa-5530
Source:
support@hackerone.com
Resource:
Mailing List
Third Party Advisory
Change History
0
Changes found
Details not found