3.7 CVE-2026-26961

Enriched by CISA
 

Rack is a modular Ruby web server interface. Prior to versions 2.2.23, 3.1.21, and 3.2.6, Rack::Multipart::Parser extracts the boundary parameter from multipart/form-data using a greedy regular expression. When a Content-Type header contains multiple boundary parameters, Rack selects the last one rather than the first. In deployments where an upstream proxy, WAF, or intermediary interprets the first boundary parameter, this mismatch can allow an attacker to smuggle multipart content past upstream inspection and have Rack parse a different body structure than the intermediary validated. This issue has been patched in versions 2.2.23, 3.1.21, and 3.2.6.
https://nvd.nist.gov/vuln/detail/CVE-2026-26961

Categories

CWE-436 : Interpretation Conflict
This is generally found in proxies, firewalls, anti-virus software, and other intermediary devices that monitor, allow, deny, or modify traffic based on how the client or server is expected to behave.

References


 

AFFECTED (from MITRE)


Vendor Product Versions
rack rack
  • < 2.2.23 [affected]
  • >= 3.0.0.beta1, < 3.1.21 [affected]
  • >= 3.2.0, < 3.2.6 [affected]
© 2022 The MITRE Corporation. This work is reproduced and distributed with the permission of The MITRE Corporation.

CPE

cpe start end


REMEDIATION




EXPLOITS


Exploit-db.com

id description date
No known exploits

POC Github

Url
No known exploits

Other Nist (github, ...)

Url
No known exploits


CAPEC


Common Attack Pattern Enumerations and Classifications

id description severity
105 HTTP Request Splitting
High
273 HTTP Response Smuggling
High
34 HTTP Response Splitting
High