rack 3.1.8 → 3.1.14

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of rack might be problematic. Click here for more details.

checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: cd9b9438930771f3687ff42be3f3506df2faeea5d947d8ed4fa9e5eec1b5970c
4
- data.tar.gz: 170b7d3e30e472e5a5403f9bb889f37b60e4e9eced41e94f97a88d848e5c2fb4
3
+ metadata.gz: 558fa2ba3e85c5e5c3775d72153132d6f667aa7390421fb6769b6cc26dd3bd72
4
+ data.tar.gz: 135df43165c5e6fa3a69cd4857ee2e514cfe7841ed3728889e61185268e86531
5
5
  SHA512:
6
- metadata.gz: 0a5c0c56cda8181c7ec4e87a348b54a22938d4c450a9647fbbf07aaec37282ff89230d3964ba0dfd9f5bc7f7e60d99eaf704636de143704c5e9156120bd04624
7
- data.tar.gz: eeef987e1c6dc77ff1fc40e5cc0e37bde704d354c62217a834e6a4d36828900a71dac09e591a9743273fc5ea678bf603d36c3e165f9c7dbfa1759301c42f957f
6
+ metadata.gz: 3543b51083a592a6609ac760ee6b4a692b442496258470c3d70cd94ada81c22439c21e5637599e6d85fd0c25983fc0819883f2449466cfb3c41ed8154287b221
7
+ data.tar.gz: a1da3c54d64e956c1b4b02065da3deaff9ef9e212e2c5366260691caef698bea993ceb9b26e0a26d72f37481fb0f0a91803fe99e864baffbbfa10e31ca4e79cc
data/CHANGELOG.md CHANGED
@@ -2,8 +2,44 @@
2
2
 
3
3
  All notable changes to this project will be documented in this file. For info on how to format all future additions to this file please reference [Keep A Changelog](https://keepachangelog.com/en/1.0.0/).
4
4
 
5
+ ## [3.1.14] - 2025-05-06
6
+
7
+ ### Security
8
+
9
+ - [CVE-2025-46727](https://github.com/rack/rack/security/advisories/GHSA-gjh7-p2fx-99vx) Unbounded parameter parsing in `Rack::QueryParser` can lead to memory exhaustion.
10
+
11
+ ## [3.1.13] - 2025-04-13
12
+
13
+ - Ensure `Rack::ETag` correctly updates response body. ([#2324](https://github.com/rack/rack/pull/2324), [@ioquatix])
14
+
15
+ ## [3.1.12] - 2025-03-11
16
+
17
+ ### Security
18
+
19
+ - [CVE-2025-27610](https://github.com/rack/rack/security/advisories/GHSA-7wqh-767x-r66v) Local file inclusion in `Rack::Static`.
20
+
21
+ ## [3.1.11] - 2025-03-04
22
+
23
+ ### Security
24
+
25
+ - [CVE-2025-27111](https://github.com/rack/rack/security/advisories/GHSA-8cgq-6mh2-7j6v) Possible Log Injection in `Rack::Sendfile`.
26
+
27
+ ## [3.1.10] - 2025-02-12
28
+
29
+ ### Security
30
+
31
+ - [CVE-2025-25184](https://github.com/rack/rack/security/advisories/GHSA-7g2v-jj9q-g3rg) Possible Log Injection in `Rack::CommonLogger`.
32
+
33
+ ## [3.1.9] - 2025-01-31
34
+
35
+ ### Fixed
36
+
37
+ - `Rack::MediaType#params` now handles parameters without values. ([#2263](https://github.com/rack/rack/pull/2263), [@AllyMarthaJ](https://github.com/AllyMarthaJ))
38
+
5
39
  ## [3.1.8] - 2024-10-14
6
40
 
41
+ ### Fixed
42
+
7
43
  - Resolve deprecation warnings about uri `DEFAULT_PARSER`. ([#2249](https://github.com/rack/rack/pull/2249), [@earlopain])
8
44
 
9
45
  ## [3.1.7] - 2024-07-11
@@ -103,6 +139,34 @@ Rack v3.1 is primarily a maintenance release that removes features deprecated in
103
139
 
104
140
  - In `Rack::Files`, ignore the `Range` header if served file is 0 bytes. ([#2159](https://github.com/rack/rack/pull/2159), [@zarqman])
105
141
 
142
+ ## [3.0.16] - 2025-05-06
143
+
144
+ ### Security
145
+
146
+ - [CVE-2025-46727](https://github.com/rack/rack/security/advisories/GHSA-gjh7-p2fx-99vx) Unbounded parameter parsing in `Rack::QueryParser` can lead to memory exhaustion.
147
+
148
+ ## [3.0.15] - 2025-04-13
149
+
150
+ - Ensure `Rack::ETag` correctly updates response body. ([#2324](https://github.com/rack/rack/pull/2324), [@ioquatix])
151
+
152
+ ## [3.0.14] - 2025-03-11
153
+
154
+ ### Security
155
+
156
+ - [CVE-2025-27610](https://github.com/rack/rack/security/advisories/GHSA-7wqh-767x-r66v) Local file inclusion in `Rack::Static`.
157
+
158
+ ## [3.0.13] - 2025-03-04
159
+
160
+ ### Security
161
+
162
+ - [CVE-2025-27111](https://github.com/rack/rack/security/advisories/GHSA-8cgq-6mh2-7j6v) Possible Log Injection in `Rack::Sendfile`.
163
+
164
+ ## [3.0.12] - 2025-02-12
165
+
166
+ ### Security
167
+
168
+ - [CVE-2025-25184](https://github.com/rack/rack/security/advisories/GHSA-7g2v-jj9q-g3rg) Possible Log Injection in `Rack::CommonLogger`.
169
+
106
170
  ## [3.0.11] - 2024-05-10
107
171
 
108
172
  - Backport #2062 to 3-0-stable: Do not allow `BodyProxy` to respond to `to_str`, make `to_ary` call close . ([#2062](https://github.com/rack/rack/pull/2062), [@jeremyevans](https://github.com/jeremyevans))
@@ -279,6 +343,76 @@ Rack v3.1 is primarily a maintenance release that removes features deprecated in
279
343
  - Fix multipart filename generation for filenames that contain spaces. Encode spaces as "%20" instead of "+" which will be decoded properly by the multipart parser. ([#1736](https://github.com/rack/rack/pull/1645), [@muirdm](https://github.com/muirdm))
280
344
  - `Rack::Request#scheme` returns `ws` or `wss` when one of the `X-Forwarded-Scheme` / `X-Forwarded-Proto` headers is set to `ws` or `wss`, respectively. ([#1730](https://github.com/rack/rack/issues/1730), [@erwanst](https://github.com/erwanst))
281
345
 
346
+ ## [2.2.14] - 2025-05-06
347
+
348
+ ### Security
349
+
350
+ - [CVE-2025-46727](https://github.com/rack/rack/security/advisories/GHSA-gjh7-p2fx-99vx) Unbounded parameter parsing in `Rack::QueryParser` can lead to memory exhaustion.
351
+
352
+ ## [2.2.13] - 2025-03-11
353
+
354
+ ### Security
355
+
356
+ - [CVE-2025-27610](https://github.com/rack/rack/security/advisories/GHSA-7wqh-767x-r66v) Local file inclusion in `Rack::Static`.
357
+
358
+ ## [2.2.12] - 2025-03-04
359
+
360
+ ### Security
361
+
362
+ - [CVE-2025-27111](https://github.com/rack/rack/security/advisories/GHSA-8cgq-6mh2-7j6v) Possible Log Injection in `Rack::Sendfile`.
363
+
364
+ ## [2.2.11] - 2025-02-12
365
+
366
+ ### Security
367
+
368
+ - [CVE-2025-25184](https://github.com/rack/rack/security/advisories/GHSA-7g2v-jj9q-g3rg) Possible Log Injection in `Rack::CommonLogger`.
369
+
370
+ ## [2.2.10] - 2024-10-14
371
+
372
+ - Fix compatibility issues with Ruby v3.4.0. ([#2248](https://github.com/rack/rack/pull/2248), [@byroot](https://github.com/byroot))
373
+
374
+ ## [2.2.9] - 2023-03-21
375
+
376
+ - Return empty when parsing a multi-part POST with only one end delimiter. ([#2104](https://github.com/rack/rack/pull/2104), [@alpaca-tc])
377
+
378
+ ## [2.2.8] - 2023-07-31
379
+
380
+ - Regenerate SPEC ([#2102](https://github.com/rack/rack/pull/2102), [@skipkayhil](https://github.com/skipkayhil))
381
+ - Limit file extension length of multipart tempfiles ([#2015](https://github.com/rack/rack/pull/2015), [@dentarg](https://github.com/dentarg))
382
+ - Fix "undefined method DelegateClass for Rack::Session::Cookie:Class" ([#2092](https://github.com/rack/rack/pull/2092), [@onigra](https://github.com/onigra) [@dchandekstark](https://github.com/dchandekstark))
383
+
384
+ ## [2.2.7] - 2023-03-13
385
+
386
+ - Correct the year number in the changelog ([#2015](https://github.com/rack/rack/pull/2015), [@kimulab](https://github.com/kimulab))
387
+ - Support underscore in host names for Rack 2.2 (Fixes [#2070](https://github.com/rack/rack/issues/2070)) ([#2015](https://github.com/rack/rack/pull/2071), [@jeremyevans](https://github.com/jeremyevans))
388
+
389
+ ## [2.2.6.4] - 2023-03-13
390
+
391
+ - [CVE-2023-27539] Avoid ReDoS in header parsing
392
+
393
+ ## [2.2.6.3] - 2023-03-02
394
+
395
+ - [CVE-2023-27530] Introduce multipart_total_part_limit to limit total parts
396
+
397
+ ## [2.2.6.2] - 2023-01-17
398
+
399
+ - [CVE-2022-44570] Fix ReDoS in Rack::Utils.get_byte_ranges
400
+
401
+ ## [2.2.6.1] - 2023-01-17
402
+
403
+ - [CVE-2022-44571] Fix ReDoS vulnerability in multipart parser
404
+ - [CVE-2022-44572] Forbid control characters in attributes (also ReDoS)
405
+
406
+ ## [2.2.6] - 2023-01-17
407
+
408
+ - Extend `Rack::MethodOverride` to handle `QueryParser::ParamsTooDeepError` error. ([#2011](https://github.com/rack/rack/pull/2011), [@byroot](https://github.com/byroot))
409
+
410
+ ## [2.2.5] - 2022-12-27
411
+
412
+ ### Fixed
413
+
414
+ - `Rack::URLMap` uses non-deprecated form of `Regexp.new`. ([#1998](https://github.com/rack/rack/pull/1998), [@weizheheng](https://github.com/weizheheng))
415
+
282
416
  ## [2.2.4] - 2022-06-30
283
417
 
284
418
  - Better support for lower case headers in `Rack::ETag` middleware. ([#1919](https://github.com/rack/rack/pull/1919), [@ioquatix](https://github.com/ioquatix))
data/README.md CHANGED
@@ -183,6 +183,33 @@ quickly and without doing the same web stuff all over:
183
183
  Rack exposes several configuration parameters to control various features of the
184
184
  implementation.
185
185
 
186
+ ### `RACK_QUERY_PARSER_BYTESIZE_LIMIT`
187
+
188
+ This environment variable sets the default for the maximum query string bytesize
189
+ that `Rack::QueryParser` will attempt to parse. Attempts to use a query string
190
+ that exceeds this number of bytes will result in a
191
+ `Rack::QueryParser::QueryLimitError` exception. If this enviroment variable is
192
+ provided, it must be an integer, or `Rack::QueryParser` will raise an exception.
193
+
194
+ The default limit can be overridden on a per-`Rack::QueryParser` basis using
195
+ the `bytesize_limit` keyword argument when creating the `Rack::QueryParser`.
196
+
197
+ ### `RACK_QUERY_PARSER_PARAMS_LIMIT`
198
+
199
+ This environment variable sets the default for the maximum number of query
200
+ parameters that `Rack::QueryParser` will attempt to parse. Attempts to use a
201
+ query string with more than this many query parameters will result in a
202
+ `Rack::QueryParser::QueryLimitError` exception. If this enviroment variable is
203
+ provided, it must be an integer, or `Rack::QueryParser` will raise an exception.
204
+
205
+ The default limit can be overridden on a per-`Rack::QueryParser` basis using
206
+ the `params_limit` keyword argument when creating the `Rack::QueryParser`.
207
+
208
+ This is implemented by counting the number of parameter separators in the
209
+ query string, before attempting parsing, so if the same parameter key is
210
+ used multiple times in the query, each counts as a separate parameter for
211
+ this check.
212
+
186
213
  ### `param_depth_limit`
187
214
 
188
215
  ```ruby
@@ -20,7 +20,7 @@ module Rack
20
20
  # The actual format is slightly different than the above due to the
21
21
  # separation of SCRIPT_NAME and PATH_INFO, and because the elapsed
22
22
  # time in seconds is included at the end.
23
- FORMAT = %{%s - %s [%s] "%s %s%s%s %s" %d %s %0.4f\n}
23
+ FORMAT = %{%s - %s [%s] "%s %s%s%s %s" %d %s %0.4f }
24
24
 
25
25
  # +logger+ can be any object that supports the +write+ or +<<+ methods,
26
26
  # which includes the standard library Logger. These methods are called
@@ -66,7 +66,8 @@ module Rack
66
66
  length,
67
67
  Utils.clock_time - began_at)
68
68
 
69
- msg.gsub!(/[^[:print:]\n]/) { |c| sprintf("\\x%x", c.ord) }
69
+ msg.gsub!(/[^[:print:]]/) { |c| sprintf("\\x%x", c.ord) }
70
+ msg[-1] = "\n"
70
71
 
71
72
  logger = @logger || request.get_header(RACK_ERRORS)
72
73
  # Standard library logger doesn't support write but it supports << which actually
data/lib/rack/etag.rb CHANGED
@@ -32,6 +32,9 @@ module Rack
32
32
  body = body.to_ary
33
33
  digest = digest_body(body)
34
34
  headers[ETAG_STRING] = %(W/"#{digest}") if digest
35
+
36
+ # Body was modified, so we need to re-assign it:
37
+ response[2] = body
35
38
  end
36
39
 
37
40
  unless headers[CACHE_CONTROL]
@@ -27,6 +27,11 @@ module Rack
27
27
  # provided. e.g., when the CONTENT_TYPE is "text/plain;charset=utf-8",
28
28
  # this method responds with the following Hash:
29
29
  # { 'charset' => 'utf-8' }
30
+ #
31
+ # This will pass back parameters with empty strings in the hash if they
32
+ # lack a value (e.g., "text/plain;charset=" will return { 'charset' => '' },
33
+ # and "text/plain;charset" will return { 'charset' => '' }, similarly to
34
+ # the query params parser (barring the latter case, which returns nil instead)).
30
35
  def params(content_type)
31
36
  return {} if content_type.nil?
32
37
 
@@ -40,9 +45,9 @@ module Rack
40
45
 
41
46
  private
42
47
 
43
- def strip_doublequotes(str)
44
- (str.start_with?('"') && str.end_with?('"')) ? str[1..-2] : str
45
- end
48
+ def strip_doublequotes(str)
49
+ (str && str.start_with?('"') && str.end_with?('"')) ? str[1..-2] : str || ''
50
+ end
46
51
  end
47
52
  end
48
53
  end
@@ -21,21 +21,47 @@ module Rack
21
21
  include BadRequest
22
22
  end
23
23
 
24
- # ParamsTooDeepError is the error that is raised when params are recursively
25
- # nested over the specified limit.
26
- class ParamsTooDeepError < RangeError
24
+ # QueryLimitError is for errors raised when the query provided exceeds one
25
+ # of the query parser limits.
26
+ class QueryLimitError < RangeError
27
27
  include BadRequest
28
28
  end
29
29
 
30
- def self.make_default(param_depth_limit)
31
- new Params, param_depth_limit
30
+ # ParamsTooDeepError is the old name for the error that is raised when params
31
+ # are recursively nested over the specified limit. Make it the same as
32
+ # as QueryLimitError, so that code that rescues ParamsTooDeepError error
33
+ # to handle bad query strings also now handles other limits.
34
+ ParamsTooDeepError = QueryLimitError
35
+
36
+ def self.make_default(param_depth_limit, **options)
37
+ new(Params, param_depth_limit, **options)
32
38
  end
33
39
 
34
40
  attr_reader :param_depth_limit
35
41
 
36
- def initialize(params_class, param_depth_limit)
42
+ env_int = lambda do |key, val|
43
+ if str_val = ENV[key]
44
+ begin
45
+ val = Integer(str_val, 10)
46
+ rescue ArgumentError
47
+ raise ArgumentError, "non-integer value provided for environment variable #{key}"
48
+ end
49
+ end
50
+
51
+ val
52
+ end
53
+
54
+ BYTESIZE_LIMIT = env_int.call("RACK_QUERY_PARSER_BYTESIZE_LIMIT", 4194304)
55
+ private_constant :BYTESIZE_LIMIT
56
+
57
+ PARAMS_LIMIT = env_int.call("RACK_QUERY_PARSER_PARAMS_LIMIT", 4096)
58
+ private_constant :PARAMS_LIMIT
59
+
60
+ def initialize(params_class, param_depth_limit, bytesize_limit: BYTESIZE_LIMIT, params_limit: PARAMS_LIMIT)
37
61
  @params_class = params_class
38
62
  @param_depth_limit = param_depth_limit
63
+ @bytesize_limit = bytesize_limit
64
+ @params_limit = params_limit
39
65
  end
40
66
 
41
67
  # Stolen from Mongrel, with some small modifications:
@@ -47,7 +73,7 @@ module Rack
47
73
 
48
74
  params = make_params
49
75
 
50
- (qs || '').split(separator ? (COMMON_SEP[separator] || /[#{separator}] */n) : DEFAULT_SEP).each do |p|
76
+ check_query_string(qs, separator).split(separator ? (COMMON_SEP[separator] || /[#{separator}] */n) : DEFAULT_SEP).each do |p|
51
77
  next if p.empty?
52
78
  k, v = p.split('=', 2).map!(&unescaper)
53
79
 
@@ -74,7 +100,7 @@ module Rack
74
100
  params = make_params
75
101
 
76
102
  unless qs.nil? || qs.empty?
77
- (qs || '').split(separator ? (COMMON_SEP[separator] || /[#{separator}] */n) : DEFAULT_SEP).each do |p|
103
+ check_query_string(qs, separator).split(separator ? (COMMON_SEP[separator] || /[#{separator}] */n) : DEFAULT_SEP).each do |p|
78
104
  k, v = p.split('=', 2).map! { |s| unescape(s) }
79
105
 
80
106
  _normalize_params(params, k, v, 0)
@@ -189,6 +215,22 @@ module Rack
189
215
  true
190
216
  end
191
217
 
218
+ def check_query_string(qs, sep)
219
+ if qs
220
+ if qs.bytesize > @bytesize_limit
221
+ raise QueryLimitError, "total query size (#{qs.bytesize}) exceeds limit (#{@bytesize_limit})"
222
+ end
223
+
224
+ if (param_count = qs.count(sep.is_a?(String) ? sep : '&')) >= @params_limit
225
+ raise QueryLimitError, "total number of query parameters (#{param_count+1}) exceeds limit (#{@params_limit})"
226
+ end
227
+
228
+ qs
229
+ else
230
+ ''
231
+ end
232
+ end
233
+
192
234
  def unescape(string, encoding = Encoding::UTF_8)
193
235
  URI.decode_www_form_component(string, encoding)
194
236
  end
data/lib/rack/sendfile.rb CHANGED
@@ -138,7 +138,7 @@ module Rack
138
138
  end
139
139
  when '', nil
140
140
  else
141
- env[RACK_ERRORS].puts "Unknown x-sendfile variation: '#{type}'.\n"
141
+ env[RACK_ERRORS].puts "Unknown x-sendfile variation: #{type.inspect}"
142
142
  end
143
143
  end
144
144
  response
data/lib/rack/static.rb CHANGED
@@ -124,8 +124,9 @@ module Rack
124
124
 
125
125
  def call(env)
126
126
  path = env[PATH_INFO]
127
+ actual_path = Utils.clean_path_info(Utils.unescape_path(path))
127
128
 
128
- if can_serve(path)
129
+ if can_serve(actual_path)
129
130
  if overwrite_file_path(path)
130
131
  env[PATH_INFO] = (add_index_root?(path) ? path + @index : @urls[path])
131
132
  elsif @gzip && env['HTTP_ACCEPT_ENCODING'] && /\bgzip\b/.match?(env['HTTP_ACCEPT_ENCODING'])
data/lib/rack/version.rb CHANGED
@@ -12,7 +12,7 @@
12
12
  # so it should be enough just to <tt>require 'rack'</tt> in your code.
13
13
 
14
14
  module Rack
15
- RELEASE = "3.1.8"
15
+ RELEASE = "3.1.14"
16
16
 
17
17
  # Return the Rack release as a dotted string.
18
18
  def self.release
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: rack
3
3
  version: !ruby/object:Gem::Version
4
- version: 3.1.8
4
+ version: 3.1.14
5
5
  platform: ruby
6
6
  authors:
7
7
  - Leah Neukirchen
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2024-10-14 00:00:00.000000000 Z
11
+ date: 2025-05-06 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: minitest
@@ -158,7 +158,7 @@ required_rubygems_version: !ruby/object:Gem::Requirement
158
158
  - !ruby/object:Gem::Version
159
159
  version: '0'
160
160
  requirements: []
161
- rubygems_version: 3.5.11
161
+ rubygems_version: 3.5.22
162
162
  signing_key:
163
163
  specification_version: 4
164
164
  summary: A modular Ruby webserver interface.