Visit Rails NES Home Page
Rails 4.2.x
NES Release Notes
4.2.11.40
Bug Fixes
- CVE-2025-24293 (activestorage) allowed transformation methods that were potentially unsafe
- CVE-2025-55193 (activestorage) logging vulnerable to ANSI escape injection
Rack 1.6.3.25
Bug Fixes
- Removed an unnecessary warning caused by the last change ("unknown or unsafe x-sendfile variation"). This change has no security implications.
Rack 1.6.3.24
Bug Fixes
- CVE-2025-61919:
Rack::Request#POSTreads the entire request body into memory forContent-Type:application/x-www-form-urlencoded, callingrack.input.read(nil)without enforcing a length or cap. Large request bodies can therefore be buffered completely into process memory before parsing, leading to denial of service (DoS) through memory exhaustion. - CVE-2025-61780: A possible information disclosure vulnerability existed in
Rack::Sendfilewhen running behind a proxy that supportsx-sendfileheaders (such as Nginx). Specially crafted headers could causeRack::Sendfileto miscommunicate with the proxy and trigger unintended internal requests, potentially bypassing proxy-level access restrictions.
Rack 1.6.3.23
Bug Fixes
- CVE-2025-61770:
Rack::Multipart::Parserbuffers the entire multipart preamble (bytes before the first boundary) in memory without any size limit. A client can send a large preamble followed by a valid boundary, causing significant memory use and potential process termination due to out-of-memory (OOM) conditions. - CVE-2025-61771:
Rack::Multipart::Parserstores non-file form fields (parts without afilename) entirely in memory as RubyStringobjects. A single large text field in a multipart/form-data request (hundreds of megabytes or more) can consume equivalent process memory, potentially leading to out-of-memory (OOM) conditions and denial of service (DoS). - CVE-2025-61772:
Rack::Multipart::Parsercan accumulate unbounded data when a multipart part's header block never terminates with the required blank line (CRLFCRLF). The parser keeps appending incoming bytes to memory without a size cap, allowing a remote attacker to exhaust memory and cause a denial of service (DoS).
4.2.11.39
Rack 1.6.3.22
- CVE-2025-49007: There is a denial of service vulnerability in the Content-Disposition parsing component of Rack.
Notes
- This is the initial release of the NES Rails 4.2.x series. It also includes the release of NES for Rack v1.6.13.21.
Bug Fixes
- CVE-2025-46727 (rack) - Unbounded-Parameter DoS in Rack::QueryParser
- CVE-2025-32441 (rack) - Session Reuse in Rack::Session::Pool
- CVE-2025-27111 (rack) - Escape Sequence Injection vulnerability in Rack lead to Possible Log Injection
- CVE-2025-27610 (rack) - Local File Inclusion in Rack::Static
- CVE-2025-25184 (rack) - Possible Log Injection in Rack::CommonLogger
- CVE-2023-28362 (actionpack) – Fixed a possible cross-site scripting (XSS) vulnerability via user-supplied values in redirect_to.
- CVE-2021-22904 (actionpack) – Fixed a possible denial-of-service (DoS) vulnerability in Action Controller token authentication.
- CVE-2023-22795 (actionpack) – Fixed a ReDoS-based DoS vulnerability in Action Dispatch.
- CVE-2021-22885 (actionpack) – Fixed an information disclosure and unintended method execution vulnerability in Action Pack.
- CVE-2023-22792 (actionpack) – Fixed a ReDoS-based DoS vulnerability in Action Dispatch.
- CVE-2024-47887 (actionpack) – Fixed a possible ReDoS vulnerability in HTTP token authentication in Action Controller.
- CVE-2024-41128 (actionpack) – Fixed a possible ReDoS vulnerability in query parameter filtering in Action Dispatch.
- CVE-2022-32224 (activerecord) – Fixed a remote code execution (RCE) vulnerability with serialized columns in Active Record.
- CVE-2022-44566 (activerecord) – Fixed a denial-of-service (DoS) vulnerability in Active Record's PostgreSQL adapter.
- CVE-2023-22796 (activesupport) – Fixed a ReDoS-based DoS vulnerability in Active Support’s underscore.
- CVE-2023-28120 (activesupport) – Fixed a possible XSS security vulnerability in SafeBuffer#bytesplice (not originally affected but patched).
- CVE-2020-5267 (actionview) – Fixed a cross-site scripting (XSS) vulnerability in Action View.
- CVE-2019-5418 (actionview) – Fixed a path traversal vulnerability in Action View.
- CVE-2020-15169 (actionview) – Fixed an XSS vulnerability in Action View.
- CVE-2022-27777 (actionview) – Fixed an XSS vulnerability in Action View tag helpers.
- CVE-2020-8163 (actionview) – Fixed a remote code execution vulnerability via user-provided local names in Action View.
- CVE-2019-5419 (actionview) – Fixed a denial-of-service vulnerability in Action View.
- CVE-2024-25126 (rack) – Fixed a vulnerability in Rack related to ReDoS in content type parsing.
- CVE-2023-27530 (rack) – Fixed a possible DoS vulnerability in Rack’s multipart MIME parsing.
- CVE-2020-8161 (rack) – Fixed a directory traversal vulnerability in Rack::Directory.
- CVE-2022-44570 (rack) – Fixed a denial-of-service vulnerability caused by header parsing in Rack.
- CVE-2022-30122 (rack) – Fixed a denial-of-service vulnerability in Rack multipart parsing.
- CVE-2020-8184 (rack) – Fixed an issue in Rack allowing percent-encoded cookies to overwrite existing prefixed cookie names.
- CVE-2022-30123 (rack) – Fixed a possible shell escape sequence injection vulnerability in Rack.
- CVE-2024-26141 (rack) – Fixed a possible DoS vulnerability with the Range header in Rack.
- CVE-2024-47889 (actionmailer) – Fixed a possible ReDoS vulnerability in block_format in Action Mailer.
- CVE-2024-26146 (rack) - Fixed Rack Header Parsing leads to Possible Denial of Service Vulnerability