3
0
Fork 0
bundle-audit-results/bundle-audit.json

1 line
1.2 KiB
JSON

{"version":"0.9.2","created_at":"2025-03-06 11:25:00 +0100","results":[{"type":"unpatched_gem","gem":{"name":"rack","version":"3.1.10"},"advisory":{"path":"/home/wiseadvice/.local/share/ruby-advisory-db/gems/rack/CVE-2025-27111.yml","id":"CVE-2025-27111","url":"https://github.com/rack/rack/security/advisories/GHSA-8cgq-6mh2-7j6v","title":"Escape Sequence Injection vulnerability in Rack lead to Possible Log Injection","date":"2025-03-04","description":"## Summary\n\n`Rack::Sendfile` can be exploited by crafting input that\nincludes newline characters to manipulate log entries.\n\n## Details\n\nThe `Rack::Sendfile` middleware logs unsanitized header values from\nthe `X-Sendfile-Type` header. An attacker can exploit this by\ninjecting escape sequences (such as newline characters) into the\nheader, resulting in log injection.\n\n## Impact\n\nThis vulnerability can distort log files, obscure\nattack traces, and complicate security auditing.\n\n## Mitigation\n\n- Update to the latest version of Rack, or\n- Remove usage of `Rack::Sendfile`.\n","cvss_v2":null,"cvss_v3":null,"cve":"2025-27111","osvdb":null,"ghsa":"8cgq-6mh2-7j6v","unaffected_versions":[],"patched_versions":["~> 2.2.12","~> 3.0.13",">= 3.1.11"],"criticality":null}}]}