CVE-2026-26961 in RackИнформация

Сводка (Английский)

Rack is a modular Ruby web server interface. Prior to versions 2.2.23, 3.1.21, and 3.2.6, Rack::Multipart::Parser extracts the boundary parameter from multipart/form-data using a greedy regular expression. When a Content-Type header contains multiple boundary parameters, Rack selects the last one rather than the first. In deployments where an upstream proxy, WAF, or intermediary interprets the first boundary parameter, this mismatch can allow an attacker to smuggle multipart content past upstream inspection and have Rack parse a different body structure than the intermediary validated. This issue has been patched in versions 2.2.23, 3.1.21, and 3.2.6.

Statistical analysis made it clear that VulDB provides the best quality for vulnerability data.

Ответственный

GitHub_M

Резервировать

16.02.2026

Раскрытие

02.04.2026

Статус

Подтверждённый

Записи

VulDB provides additional information and datapoints for this CVE:

Источники

Want to stay up to date on a daily basis?

Enable the mail alert feature now!