File tree Expand file tree Collapse file tree 1 file changed +43
-0
lines changed
Expand file tree Collapse file tree 1 file changed +43
-0
lines changed Original file line number Diff line number Diff line change 1+ ---
2+ gem : rack
3+ cve : 2025-27111
4+ ghsa : 8cgq-6mh2-7j6v
5+ url : https://github.com/rack/rack/security/advisories/GHSA-8cgq-6mh2-7j6v
6+ title : Escape Sequence Injection vulnerability in
7+ Rack lead to Possible Log Injection
8+ date : 2025-03-04
9+ description : |
10+ ## Summary
11+
12+ `Rack::Sendfile` can be exploited by crafting input that
13+ includes newline characters to manipulate log entries.
14+
15+ ## Details
16+
17+ The `Rack::Sendfile` middleware logs unsanitized header values from
18+ the `X-Sendfile-Type` header. An attacker can exploit this by
19+ injecting escape sequences (such as newline characters) into the
20+ header, resulting in log injection.
21+
22+ ## Impact
23+
24+ This vulnerability can distort log files, obscure
25+ attack traces, and complicate security auditing.
26+
27+ ## Mitigation
28+
29+ - Update to the latest version of Rack, or
30+ - Remove usage of `Rack::Sendfile`.
31+ cvss_v4 : 6.9
32+ patched_versions :
33+ - " ~> 2.2.12"
34+ - " ~> 3.0.13"
35+ - " >= 3.1.11"
36+ related :
37+ url :
38+ - https://nvd.nist.gov/vuln/detail/CVE-2025-27111
39+ - https://github.com/rack/rack/security/advisories/GHSA-8cgq-6mh2-7j6v
40+ - https://github.com/rack/rack/commit/803aa221e8302719715e224f4476e438f2531a53
41+ - https://github.com/rack/rack/commit/aeac570bb8080ca7b53b7f2e2f67498be7ebd30b
42+ - https://github.com/rack/rack/commit/b13bc6bfc7506aca3478dc5ac1c2ec6fc53f82a3
43+ - https://github.com/advisories/GHSA-8cgq-6mh2-7j6v
You can’t perform that action at this time.
0 commit comments