Project Subscriptions
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-r46p-8f7g-vvvg | Rails Active Storage has a possible DoS vulnerability when in proxy mode via Range requests |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 24 Mar 2026 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Rubyonrails
Rubyonrails rails |
|
| CPEs | cpe:2.3:a:rubyonrails:rails:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Rubyonrails
Rubyonrails rails |
|
| Metrics |
cvssV3_1
|
cvssV3_1
|
Tue, 24 Mar 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 24 Mar 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-770 | |
| References |
| |
| Metrics |
threat_severity
|
cvssV3_1
|
Tue, 24 Mar 2026 10:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Rails
Rails activestorage |
|
| Vendors & Products |
Rails
Rails activestorage |
Tue, 24 Mar 2026 02:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Active Storage allows users to attach cloud and local files in Rails applications. Prior to versions 8.1.2.1, 8.0.4.1, and 7.2.3.1, when serving files through Active Storage's proxy delivery mode, the proxy controller loads the entire requested byte range into memory before sending it. A request with a large or unbounded Range header (e.g. `bytes=0-`) could cause the server to allocate memory proportional to the file size, possibly resulting in a DoS vulnerability through memory exhaustion. Versions 8.1.2.1, 8.0.4.1, and 7.2.3.1 contain a patch. | |
| Title | Rails Active Storage has a possible DoS vulnerability when in proxy mode via Range requests | |
| Weaknesses | CWE-789 | |
| References |
|
|
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-24T13:40:32.031Z
Reserved: 2026-03-17T22:16:36.719Z
Link: CVE-2026-33174
Updated: 2026-03-24T13:40:27.286Z
Status : Analyzed
Published: 2026-03-24T00:16:28.630
Modified: 2026-03-24T17:55:58.230
Link: CVE-2026-33174
OpenCVE Enrichment
Updated: 2026-03-24T10:29:57Z
Github GHSA