Логотип exploitDog
bind:CVE-2025-61780
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-61780

Количество 7

Количество 7

ubuntu логотип

CVE-2025-61780

около 2 месяцев назад

Rack is a modular Ruby web server interface. Prior to versions 2.2.20, 3.1.18, and 3.2.3, a possible information disclosure vulnerability existed in `Rack::Sendfile` when running behind a proxy that supports `x-sendfile` headers (such as Nginx). Specially crafted headers could cause `Rack::Sendfile` to miscommunicate with the proxy and trigger unintended internal requests, potentially bypassing proxy-level access restrictions. When `Rack::Sendfile` received untrusted `x-sendfile-type` or `x-accel-mapping` headers from a client, it would interpret them as proxy configuration directives. This could cause the middleware to send a "redirect" response to the proxy, prompting it to reissue a new internal request that was not subject to the proxy's access controls. An attacker could exploit this by setting a crafted `x-sendfile-type: x-accel-redirect` header, setting a crafted `x-accel-mapping` header, and requesting a path that qualifies for proxy-based acceleration. Attackers could bypas...

CVSS3: 5.8
EPSS: Низкий
nvd логотип

CVE-2025-61780

около 2 месяцев назад

Rack is a modular Ruby web server interface. Prior to versions 2.2.20, 3.1.18, and 3.2.3, a possible information disclosure vulnerability existed in `Rack::Sendfile` when running behind a proxy that supports `x-sendfile` headers (such as Nginx). Specially crafted headers could cause `Rack::Sendfile` to miscommunicate with the proxy and trigger unintended internal requests, potentially bypassing proxy-level access restrictions. When `Rack::Sendfile` received untrusted `x-sendfile-type` or `x-accel-mapping` headers from a client, it would interpret them as proxy configuration directives. This could cause the middleware to send a "redirect" response to the proxy, prompting it to reissue a new internal request that was not subject to the proxy's access controls. An attacker could exploit this by setting a crafted `x-sendfile-type: x-accel-redirect` header, setting a crafted `x-accel-mapping` header, and requesting a path that qualifies for proxy-based acceleration. Attackers could bypass p

CVSS3: 5.8
EPSS: Низкий
debian логотип

CVE-2025-61780

около 2 месяцев назад

Rack is a modular Ruby web server interface. Prior to versions 2.2.20, ...

CVSS3: 5.8
EPSS: Низкий
github логотип

GHSA-r657-rxjc-j557

около 2 месяцев назад

Rack has a Possible Information Disclosure Vulnerability

CVSS3: 5.8
EPSS: Низкий
fstec логотип

BDU:2025-13873

около 2 месяцев назад

Уязвимость класса Rack::Sendfile модульного интерфейса между веб-серверами и веб-приложениями Rack, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации

CVSS3: 5.8
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:4273-1

4 дня назад

Security update for rubygem-rack

EPSS: Низкий
redos логотип

ROS-20251106-03

25 дней назад

Множественные уязвимости rubygem-rack

CVSS3: 7.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2025-61780

Rack is a modular Ruby web server interface. Prior to versions 2.2.20, 3.1.18, and 3.2.3, a possible information disclosure vulnerability existed in `Rack::Sendfile` when running behind a proxy that supports `x-sendfile` headers (such as Nginx). Specially crafted headers could cause `Rack::Sendfile` to miscommunicate with the proxy and trigger unintended internal requests, potentially bypassing proxy-level access restrictions. When `Rack::Sendfile` received untrusted `x-sendfile-type` or `x-accel-mapping` headers from a client, it would interpret them as proxy configuration directives. This could cause the middleware to send a "redirect" response to the proxy, prompting it to reissue a new internal request that was not subject to the proxy's access controls. An attacker could exploit this by setting a crafted `x-sendfile-type: x-accel-redirect` header, setting a crafted `x-accel-mapping` header, and requesting a path that qualifies for proxy-based acceleration. Attackers could bypas...

CVSS3: 5.8
0%
Низкий
около 2 месяцев назад
nvd логотип
CVE-2025-61780

Rack is a modular Ruby web server interface. Prior to versions 2.2.20, 3.1.18, and 3.2.3, a possible information disclosure vulnerability existed in `Rack::Sendfile` when running behind a proxy that supports `x-sendfile` headers (such as Nginx). Specially crafted headers could cause `Rack::Sendfile` to miscommunicate with the proxy and trigger unintended internal requests, potentially bypassing proxy-level access restrictions. When `Rack::Sendfile` received untrusted `x-sendfile-type` or `x-accel-mapping` headers from a client, it would interpret them as proxy configuration directives. This could cause the middleware to send a "redirect" response to the proxy, prompting it to reissue a new internal request that was not subject to the proxy's access controls. An attacker could exploit this by setting a crafted `x-sendfile-type: x-accel-redirect` header, setting a crafted `x-accel-mapping` header, and requesting a path that qualifies for proxy-based acceleration. Attackers could bypass p

CVSS3: 5.8
0%
Низкий
около 2 месяцев назад
debian логотип
CVE-2025-61780

Rack is a modular Ruby web server interface. Prior to versions 2.2.20, ...

CVSS3: 5.8
0%
Низкий
около 2 месяцев назад
github логотип
GHSA-r657-rxjc-j557

Rack has a Possible Information Disclosure Vulnerability

CVSS3: 5.8
0%
Низкий
около 2 месяцев назад
fstec логотип
BDU:2025-13873

Уязвимость класса Rack::Sendfile модульного интерфейса между веб-серверами и веб-приложениями Rack, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации

CVSS3: 5.8
0%
Низкий
около 2 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:4273-1

Security update for rubygem-rack

4 дня назад
redos логотип
ROS-20251106-03

Множественные уязвимости rubygem-rack

CVSS3: 7.5
25 дней назад

Уязвимостей на страницу