<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-33174 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-33174/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 24 Mar 2026 00:16:28 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-33174/feed.xml" rel="self" type="application/rss+xml"/><item><title>Ruby on Rails Active Storage DoS Vulnerability (CVE-2026-33174)</title><link>https://feed.craftedsignal.io/briefs/2026-03-rails-dos/</link><pubDate>Tue, 24 Mar 2026 00:16:28 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-rails-dos/</guid><description>A denial-of-service vulnerability (CVE-2026-33174) exists in Ruby on Rails Active Storage versions prior to 8.1.2.1, 8.0.4.1, and 7.2.3.1 due to unbounded memory allocation when handling large or unbounded Range headers in proxy delivery mode.</description><content:encoded>&lt;p>CVE-2026-33174 is a denial-of-service vulnerability affecting Ruby on Rails applications that utilize Active Storage. Specifically, it impacts versions prior to 8.1.2.1, 8.0.4.1, and 7.2.3.1. The vulnerability stems from the way Active Storage handles file serving through its proxy delivery mode. When processing requests with large or unbounded Range headers (e.g., &lt;code>bytes=0-&lt;/code>), the proxy controller incorrectly loads the entire requested byte range into memory before sending it to the client…&lt;/p>
</content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>rails</category><category>active-storage</category><category>dos</category><category>cve-2026-33174</category></item></channel></rss>