5.3 CVE-2026-34786

Enriched by CISA
 

Rack is a modular Ruby web server interface. Prior to versions 2.2.23, 3.1.21, and 3.2.6, Rack::Static#applicable_rules evaluates several header_rules types against the raw URL-encoded PATH_INFO, while the underlying file-serving path is decoded before the file is served. As a result, a request for a URL-encoded variant of a static path can serve the same file without the headers that header_rules were intended to apply. In deployments that rely on Rack::Static to attach security-relevant response headers to static content, this can allow an attacker to bypass those headers by requesting an encoded form of the path. This issue has been patched in versions 2.2.23, 3.1.21, and 3.2.6.
https://nvd.nist.gov/vuln/detail/CVE-2026-34786

Categories

CWE-180 : Incorrect Behavior Order: Validate Before Canonicalize
This can be used by an attacker to bypass the validation and launch attacks that expose weaknesses that would otherwise be prevented, such as injection.

References


 

AFFECTED (from MITRE)


Vendor Product Versions
rack rack
  • < 2.2.23 [affected]
  • >= 3.0.0.beta1, < 3.1.21 [affected]
  • >= 3.2.0, < 3.2.6 [affected]
© 2022 The MITRE Corporation. This work is reproduced and distributed with the permission of The MITRE Corporation.

CPE

cpe start end


REMEDIATION




EXPLOITS


Exploit-db.com

id description date
No known exploits

POC Github

Url
No known exploits

Other Nist (github, ...)

Url
No known exploits


CAPEC


Common Attack Pattern Enumerations and Classifications

id description severity
267 Leverage Alternate Encoding
High
3 Using Leading 'Ghost' Character Sequences to Bypass Input Filters
Medium
71 Using Unicode Encoding to Bypass Validation Logic
High
78 Using Escaped Slashes in Alternate Encoding
High
79 Using Slashes in Alternate Encoding
High
80 Using UTF-8 Encoding to Bypass Validation Logic
High


MITRE


Techniques

id description
T1027 Obfuscated Files or Information
© 2022 The MITRE Corporation. This work is reproduced and distributed with the permission of The MITRE Corporation.

Mitigations

id description
M1017 Ensure that a finite amount of ingress points to a software deployment system exist with restricted access for those required to allow and enable newly deployed software.
© 2022 The MITRE Corporation. Esta obra se reproduce y distribuye con el permiso de The MITRE Corporation.