| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-qfgr-crr9-7r49 | Rack: Forwarded Header semicolon injection enables Host and Scheme spoofing |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 03 Apr 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Rack
Rack rack |
|
| Vendors & Products |
Rack
Rack rack |
Thu, 02 Apr 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Rack is a modular Ruby web server interface. From versions 3.0.0.beta1 to before 3.1.21 and 3.2.0 to before 3.2.6, Rack::Utils.forwarded_values parses the RFC 7239 Forwarded header by splitting on semicolons before handling quoted-string values. Because quoted values may legally contain semicolons, a header can be interpreted by Rack as multiple Forwarded directives rather than as a single quoted for value. In deployments where an upstream proxy, WAF, or intermediary validates or preserves quoted Forwarded values differently, this discrepancy can allow an attacker to smuggle host, proto, for, or by parameters through a single header value. This issue has been patched in versions 3.1.21 and 3.2.6. | |
| Title | Rack: Forwarded Header semicolon injection enables Host and Scheme spoofing | |
| Weaknesses | CWE-436 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-02T17:42:42.305Z
Reserved: 2026-03-13T18:53:03.533Z
Link: CVE-2026-32762
Updated: 2026-04-02T17:42:37.595Z
Status : Received
Published: 2026-04-02T18:16:27.730
Modified: 2026-04-02T18:16:27.730
Link: CVE-2026-32762
No data.
OpenCVE Enrichment
Updated: 2026-04-03T09:18:15Z
Github GHSA