CVE-2025-25184 – rack
Package
Manager: gem
Name: rack
Vulnerable Version: >=0 <2.2.11 || >=3.0 <3.0.12 || >=3.1 <3.1.10
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:P
EPSS: 0.00249 pctl0.48052
Details
Possible Log Injection in Rack::CommonLogger ## Summary `Rack::CommonLogger` can be exploited by crafting input that includes newline characters to manipulate log entries. The supplied proof-of-concept demonstrates injecting malicious content into logs. ## Details When a user provides the authorization credentials via `Rack::Auth::Basic`, if success, the username will be put in `env['REMOTE_USER']` and later be used by `Rack::CommonLogger` for logging purposes. The issue occurs when a server intentionally or unintentionally allows a user creation with the username contain CRLF and white space characters, or the server just want to log every login attempts. If an attacker enters a username with CRLF character, the logger will log the malicious username with CRLF characters into the logfile. ## Impact Attackers can break log formats or insert fraudulent entries, potentially obscuring real activity or injecting malicious data into log files. ## Mitigation - Update to the latest version of Rack.
Metadata
Created: 2025-02-12T19:18:35Z
Modified: 2025-02-18T15:04:49Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/02/GHSA-7g2v-jj9q-g3rg/GHSA-7g2v-jj9q-g3rg.json
CWE IDs: ["CWE-117", "CWE-93"]
Alternative ID: GHSA-7g2v-jj9q-g3rg
Finding: F091
Auto approve: 1