Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2022-30123

Опубликовано: 27 мая 2022
Источник: redhat
CVSS3: 10

Описание

A sequence injection vulnerability exists in Rack <2.0.9.1, <2.1.4.1 and <2.2.3.1 which could allow is a possible shell escape in the Lint and CommonLogger components of Rack.

A flaw was found in ruby gem-rack. This flaw allows a malicious actor to craft requests that can cause shell escape sequences to be written to the terminal via rack's Lint middleware and CommonLogger middleware. This issue can leverage these escape sequences to execute commands in the victim's terminal.

Отчет

  • Because Red Hat OpenStack Platform 13.0 Operational Tools packaged the flawed code, but does not use its functionality, its Impact has been reduced to 'Low'.
  • To exploit this vulnerability, applications should have either of these middlewares 'Lint' or 'CommonLogger' installed, and vulnerable apps may have something like this: 'use Rack::Lint' OR 'use Rack::CommonLogger' The Red Hat products use the flawed code but don't use its functionality, Hence, the impact is set to Important.
  • Logging Subsystem for Red Hat OpenShift uses the vulnerable ruby gem-rack package in the openshift-logging/fluentd-rhel8 component to instantiate client-to-server communication. But, this component cannot receive any requests so exploitation by crafted request consumption is not possible. Therefore the impact of this vulnerability on the Logging Subsystem for Red Hat OpenShift is reduced to Moderate.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat OpenStack Platform 13 (Queens) Operational Toolsrubygem-rackWill not fix
Red Hat Satellite 6rubygem-rackNot affected
Logging subsystem for Red Hat OpenShift 5.4openshift-logging/fluentd-rhel8FixedRHSA-2023:063215.02.2023
Red Hat Enterprise Linux 7pcsFixedRHSA-2022:734302.11.2022
Red Hat Gluster Storage 3.5 for RHEL 7rubygem-rackFixedRHSA-2023:148628.03.2023

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-179
https://bugzilla.redhat.com/show_bug.cgi?id=2099524rubygem-rack: crafted requests can cause shell escape sequences

10 Critical

CVSS3

Связанные уязвимости

CVSS3: 10
ubuntu
больше 2 лет назад

A sequence injection vulnerability exists in Rack <2.0.9.1, <2.1.4.1 and <2.2.3.1 which could allow is a possible shell escape in the Lint and CommonLogger components of Rack.

CVSS3: 10
nvd
больше 2 лет назад

A sequence injection vulnerability exists in Rack <2.0.9.1, <2.1.4.1 and <2.2.3.1 which could allow is a possible shell escape in the Lint and CommonLogger components of Rack.

CVSS3: 10
debian
больше 2 лет назад

A sequence injection vulnerability exists in Rack <2.0.9.1, <2.1.4.1 a ...

CVSS3: 10
github
около 3 лет назад

Possible shell escape sequence injection vulnerability in Rack

CVSS3: 9.8
fstec
почти 3 года назад

Уязвимость модульного интерфейса между веб-серверами и веб-приложениями Rack, связанная с неправильной нейтрализацией специальных элементов используемых в команде ОС, позволяющая нарушителю выполнять произвольные команды оболочки в целевой системе

10 Critical

CVSS3