CVE-2026-34785

Published: Apr 02, 2026 Last Modified: Apr 02, 2026
ExploitDB:
Other exploit source:
Google Dorks:
HIGH 7,5
Attack Vector: network
Attack Complexity: low
Privileges Required: none
User Interaction: none
Scope: unchanged
Confidentiality: high
Integrity: none
Availability: none

Description

AI Translation Available

Rack is a modular Ruby web server interface. Prior to versions 2.2.23, 3.1.21, and 3.2.6, Rack::Static determines whether a request should be served as a static file using a simple string prefix check. When configured with URL prefixes such as '/css', it matches any request path that begins with that string, including unrelated paths such as '/css-config.env' or '/css-backup.sql'. As a result, files under the static root whose names merely share the configured prefix may be served unintentionally, leading to information disclosure. This issue has been patched in versions 2.2.23, 3.1.21, and 3.2.6.

187

Partial String Comparison

Incomplete
Common Consequences
Security Scopes Affected:
Integrity Access Control
Potential Impacts:
Alter Execution Logic Bypass Protection Mechanism
Applicable Platforms
All platforms may be affected
View CWE Details
200

Exposure of Sensitive Information to an Unauthorized Actor

Draft
Common Consequences
Security Scopes Affected:
Confidentiality
Potential Impacts:
Read Application Data
Applicable Platforms
Technologies: Mobile, Not Technology-Specific, Web Based
View CWE Details
https://github.com/rack/rack/security/advisories/GHSA-h2jq-g4cq-5ppq