Commit 8ab1b43 1 parent 6847b45 commit 8ab1b43 Copy full SHA for 8ab1b43
File tree 1 file changed +43
-0
lines changed
1 file changed +43
-0
lines changed Original file line number Diff line number Diff line change
1
+ ---
2
+ gem : rack
3
+ cve : 2025-27111
4
+ ghsa : 8cgq-6mh2-7j6v
5
+ url : https://github.com/rack/rack/security/advisories/GHSA-8cgq-6mh2-7j6v
6
+ title : Escape Sequence Injection vulnerability in
7
+ Rack lead to Possible Log Injection
8
+ date : 2025-03-04
9
+ description : |
10
+ ## Summary
11
+
12
+ `Rack::Sendfile` can be exploited by crafting input that
13
+ includes newline characters to manipulate log entries.
14
+
15
+ ## Details
16
+
17
+ The `Rack::Sendfile` middleware logs unsanitized header values from
18
+ the `X-Sendfile-Type` header. An attacker can exploit this by
19
+ injecting escape sequences (such as newline characters) into the
20
+ header, resulting in log injection.
21
+
22
+ ## Impact
23
+
24
+ This vulnerability can distort log files, obscure
25
+ attack traces, and complicate security auditing.
26
+
27
+ ## Mitigation
28
+
29
+ - Update to the latest version of Rack, or
30
+ - Remove usage of `Rack::Sendfile`.
31
+ cvss_v4 : 6.9
32
+ patched_versions :
33
+ - " ~> 2.2.12"
34
+ - " ~> 3.0.13"
35
+ - " >= 3.1.11"
36
+ related :
37
+ url :
38
+ - https://nvd.nist.gov/vuln/detail/CVE-2025-27111
39
+ - https://github.com/rack/rack/security/advisories/GHSA-8cgq-6mh2-7j6v
40
+ - https://github.com/rack/rack/commit/803aa221e8302719715e224f4476e438f2531a53
41
+ - https://github.com/rack/rack/commit/aeac570bb8080ca7b53b7f2e2f67498be7ebd30b
42
+ - https://github.com/rack/rack/commit/b13bc6bfc7506aca3478dc5ac1c2ec6fc53f82a3
43
+ - https://github.com/advisories/GHSA-8cgq-6mh2-7j6v
You can’t perform that action at this time.
0 commit comments