commit by to_remotes 2025-03-12 07:34:44 +0100 from cicd
parent
a41ca01da8
commit
b636eadae8
|
|
@ -1 +1 @@
|
|||
2025-03-12T07:32:47+01:00
|
||||
2025-03-12T07:34:44+01:00
|
||||
|
|
|
|||
|
|
@ -1 +1 @@
|
|||
{"version":"0.9.2","created_at":"2025-03-12 07:32:47 +0100","results":[{"type":"unpatched_gem","gem":{"name":"rack","version":"3.1.11"},"advisory":{"path":"/home/wiseadvice/.local/share/ruby-advisory-db/gems/rack/CVE-2025-27610.yml","id":"CVE-2025-27610","url":"https://github.com/rack/rack/security/advisories/GHSA-7wqh-767x-r66v","title":"Local File Inclusion in Rack::Static","date":"2025-03-10","description":"## Summary\n\n`Rack::Static` can serve files under the specified `root:` even if `urls:` are provided, which may expose other files under the specified `root:` unexpectedly.\n\n## Details\n\nThe vulnerability occurs because `Rack::Static` does not properly sanitize user-supplied paths before serving files. Specifically, encoded path traversal sequences are not correctly validated, allowing attackers to access files outside the designated static file directory.\n\n## Impact\n\nBy exploiting this vulnerability, an attacker can gain access to all files under the specified `root:` directory, provided they are able to determine then path of the file.\n\n## Mitigation\n\n- Update to the latest version of Rack, or\n- Remove usage of `Rack::Static`, or\n- Ensure that `root:` points at a directory path which only contains files which should be accessed publicly.\n\nIt is likely that a CDN or similar static file server would also mitigate the issue.","cvss_v2":null,"cvss_v3":7.5,"cve":"2025-27610","osvdb":null,"ghsa":"7wqh-767x-r66v","unaffected_versions":[],"patched_versions":["~> 2.2.13","~> 3.0.14",">= 3.1.12"],"criticality":"high"}}]}
|
||||
{"version":"0.9.2","created_at":"2025-03-12 07:34:43 +0100","results":[]}
|
||||
11
report.txt
11
report.txt
|
|
@ -1,10 +1 @@
|
|||
Name: rack
|
||||
Version: 3.1.11
|
||||
CVE: CVE-2025-27610
|
||||
GHSA: GHSA-7wqh-767x-r66v
|
||||
Criticality: High
|
||||
URL: https://github.com/rack/rack/security/advisories/GHSA-7wqh-767x-r66v
|
||||
Title: Local File Inclusion in Rack::Static
|
||||
Solution: update to '~> 2.2.13', '~> 3.0.14', '>= 3.1.12'
|
||||
|
||||
Vulnerabilities found!
|
||||
No vulnerabilities found
|
||||
|
|
|
|||
|
|
@ -1,9 +1,5 @@
|
|||
Updating ruby-advisory-db ...
|
||||
Updating 00d14ff..b7fc2b1
|
||||
Fast-forward
|
||||
gems/rack/CVE-2025-27610.yml | 38 ++++++++++++++++++++++++++++++++++++++
|
||||
1 file changed, 38 insertions(+)
|
||||
create mode 100644 gems/rack/CVE-2025-27610.yml
|
||||
Already up to date.
|
||||
Updated ruby-advisory-db
|
||||
ruby-advisory-db:
|
||||
advisories: 966 advisories
|
||||
|
|
|
|||
Loading…
Reference in New Issue