Skip to content

Commit 8ab1b43

Browse files
committed
Added CVE-2025-27111 for the rack gem.
1 parent 6847b45 commit 8ab1b43

File tree

1 file changed

+43
-0
lines changed

1 file changed

+43
-0
lines changed

gems/rack/CVE-2025-27111.yml

+43
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,43 @@
1+
---
2+
gem: rack
3+
cve: 2025-27111
4+
ghsa: 8cgq-6mh2-7j6v
5+
url: https://github.com/rack/rack/security/advisories/GHSA-8cgq-6mh2-7j6v
6+
title: Escape Sequence Injection vulnerability in
7+
Rack lead to Possible Log Injection
8+
date: 2025-03-04
9+
description: |
10+
## Summary
11+
12+
`Rack::Sendfile` can be exploited by crafting input that
13+
includes newline characters to manipulate log entries.
14+
15+
## Details
16+
17+
The `Rack::Sendfile` middleware logs unsanitized header values from
18+
the `X-Sendfile-Type` header. An attacker can exploit this by
19+
injecting escape sequences (such as newline characters) into the
20+
header, resulting in log injection.
21+
22+
## Impact
23+
24+
This vulnerability can distort log files, obscure
25+
attack traces, and complicate security auditing.
26+
27+
## Mitigation
28+
29+
- Update to the latest version of Rack, or
30+
- Remove usage of `Rack::Sendfile`.
31+
cvss_v4: 6.9
32+
patched_versions:
33+
- "~> 2.2.12"
34+
- "~> 3.0.13"
35+
- ">= 3.1.11"
36+
related:
37+
url:
38+
- https://nvd.nist.gov/vuln/detail/CVE-2025-27111
39+
- https://github.com/rack/rack/security/advisories/GHSA-8cgq-6mh2-7j6v
40+
- https://github.com/rack/rack/commit/803aa221e8302719715e224f4476e438f2531a53
41+
- https://github.com/rack/rack/commit/aeac570bb8080ca7b53b7f2e2f67498be7ebd30b
42+
- https://github.com/rack/rack/commit/b13bc6bfc7506aca3478dc5ac1c2ec6fc53f82a3
43+
- https://github.com/advisories/GHSA-8cgq-6mh2-7j6v

0 commit comments

Comments
 (0)