Логотип exploitDog
bind:CVE-2025-25184
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-25184

Количество 9

Количество 9

ubuntu логотип

CVE-2025-25184

4 месяца назад

Rack provides an interface for developing web applications in Ruby. Prior to versions 2.2.11, 3.0.12, and 3.1.10, Rack::CommonLogger can be exploited by crafting input that includes newline characters to manipulate log entries. The supplied proof-of-concept demonstrates injecting malicious content into logs. When a user provides the authorization credentials via Rack::Auth::Basic, if success, the username will be put in env['REMOTE_USER'] and later be used by Rack::CommonLogger for logging purposes. The issue occurs when a server intentionally or unintentionally allows a user creation with the username contain CRLF and white space characters, or the server just want to log every login attempts. If an attacker enters a username with CRLF character, the logger will log the malicious username with CRLF characters into the logfile. Attackers can break log formats or insert fraudulent entries, potentially obscuring real activity or injecting malicious data into log files. Versions 2.2.11...

EPSS: Низкий
redhat логотип

CVE-2025-25184

4 месяца назад

Rack provides an interface for developing web applications in Ruby. Prior to versions 2.2.11, 3.0.12, and 3.1.10, Rack::CommonLogger can be exploited by crafting input that includes newline characters to manipulate log entries. The supplied proof-of-concept demonstrates injecting malicious content into logs. When a user provides the authorization credentials via Rack::Auth::Basic, if success, the username will be put in env['REMOTE_USER'] and later be used by Rack::CommonLogger for logging purposes. The issue occurs when a server intentionally or unintentionally allows a user creation with the username contain CRLF and white space characters, or the server just want to log every login attempts. If an attacker enters a username with CRLF character, the logger will log the malicious username with CRLF characters into the logfile. Attackers can break log formats or insert fraudulent entries, potentially obscuring real activity or injecting malicious data into log files. Versions 2.2.11...

CVSS3: 6.5
EPSS: Низкий
nvd логотип

CVE-2025-25184

4 месяца назад

Rack provides an interface for developing web applications in Ruby. Prior to versions 2.2.11, 3.0.12, and 3.1.10, Rack::CommonLogger can be exploited by crafting input that includes newline characters to manipulate log entries. The supplied proof-of-concept demonstrates injecting malicious content into logs. When a user provides the authorization credentials via Rack::Auth::Basic, if success, the username will be put in env['REMOTE_USER'] and later be used by Rack::CommonLogger for logging purposes. The issue occurs when a server intentionally or unintentionally allows a user creation with the username contain CRLF and white space characters, or the server just want to log every login attempts. If an attacker enters a username with CRLF character, the logger will log the malicious username with CRLF characters into the logfile. Attackers can break log formats or insert fraudulent entries, potentially obscuring real activity or injecting malicious data into log files. Versions 2.2.11, 3

EPSS: Низкий
debian логотип

CVE-2025-25184

4 месяца назад

Rack provides an interface for developing web applications in Ruby. Pr ...

EPSS: Низкий
redos логотип

ROS-20250616-03

4 дня назад

Уязвимость rubygem-rack

CVSS3: 6.5
EPSS: Низкий
github логотип

GHSA-7g2v-jj9q-g3rg

4 месяца назад

Possible Log Injection in Rack::CommonLogger

EPSS: Низкий
oracle-oval логотип

ELSA-2025-7085

около 1 месяца назад

ELSA-2025-7085: pcs security update (MODERATE)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:0858-1

3 месяца назад

Security update for rubygem-rack-1_6

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:0874-1

3 месяца назад

Security update for rubygem-rack

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2025-25184

Rack provides an interface for developing web applications in Ruby. Prior to versions 2.2.11, 3.0.12, and 3.1.10, Rack::CommonLogger can be exploited by crafting input that includes newline characters to manipulate log entries. The supplied proof-of-concept demonstrates injecting malicious content into logs. When a user provides the authorization credentials via Rack::Auth::Basic, if success, the username will be put in env['REMOTE_USER'] and later be used by Rack::CommonLogger for logging purposes. The issue occurs when a server intentionally or unintentionally allows a user creation with the username contain CRLF and white space characters, or the server just want to log every login attempts. If an attacker enters a username with CRLF character, the logger will log the malicious username with CRLF characters into the logfile. Attackers can break log formats or insert fraudulent entries, potentially obscuring real activity or injecting malicious data into log files. Versions 2.2.11...

0%
Низкий
4 месяца назад
redhat логотип
CVE-2025-25184

Rack provides an interface for developing web applications in Ruby. Prior to versions 2.2.11, 3.0.12, and 3.1.10, Rack::CommonLogger can be exploited by crafting input that includes newline characters to manipulate log entries. The supplied proof-of-concept demonstrates injecting malicious content into logs. When a user provides the authorization credentials via Rack::Auth::Basic, if success, the username will be put in env['REMOTE_USER'] and later be used by Rack::CommonLogger for logging purposes. The issue occurs when a server intentionally or unintentionally allows a user creation with the username contain CRLF and white space characters, or the server just want to log every login attempts. If an attacker enters a username with CRLF character, the logger will log the malicious username with CRLF characters into the logfile. Attackers can break log formats or insert fraudulent entries, potentially obscuring real activity or injecting malicious data into log files. Versions 2.2.11...

CVSS3: 6.5
0%
Низкий
4 месяца назад
nvd логотип
CVE-2025-25184

Rack provides an interface for developing web applications in Ruby. Prior to versions 2.2.11, 3.0.12, and 3.1.10, Rack::CommonLogger can be exploited by crafting input that includes newline characters to manipulate log entries. The supplied proof-of-concept demonstrates injecting malicious content into logs. When a user provides the authorization credentials via Rack::Auth::Basic, if success, the username will be put in env['REMOTE_USER'] and later be used by Rack::CommonLogger for logging purposes. The issue occurs when a server intentionally or unintentionally allows a user creation with the username contain CRLF and white space characters, or the server just want to log every login attempts. If an attacker enters a username with CRLF character, the logger will log the malicious username with CRLF characters into the logfile. Attackers can break log formats or insert fraudulent entries, potentially obscuring real activity or injecting malicious data into log files. Versions 2.2.11, 3

0%
Низкий
4 месяца назад
debian логотип
CVE-2025-25184

Rack provides an interface for developing web applications in Ruby. Pr ...

0%
Низкий
4 месяца назад
redos логотип
ROS-20250616-03

Уязвимость rubygem-rack

CVSS3: 6.5
0%
Низкий
4 дня назад
github логотип
GHSA-7g2v-jj9q-g3rg

Possible Log Injection in Rack::CommonLogger

0%
Низкий
4 месяца назад
oracle-oval логотип
ELSA-2025-7085

ELSA-2025-7085: pcs security update (MODERATE)

около 1 месяца назад
suse-cvrf логотип
SUSE-SU-2025:0858-1

Security update for rubygem-rack-1_6

3 месяца назад
suse-cvrf логотип
SUSE-SU-2025:0874-1

Security update for rubygem-rack

3 месяца назад

Уязвимостей на страницу