CVE-2025-27610 – rack
Package
Manager: gem
Name: rack
Vulnerable Version: >=0 <2.2.13 || >=3.0 <3.0.14 || >=3.1 <3.1.12
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
EPSS: 0.00208 pctl0.43237
Details
Local File Inclusion in Rack::Static ## Summary `Rack::Static` can serve files under the specified `root:` even if `urls:` are provided, which may expose other files under the specified `root:` unexpectedly. ## Details The vulnerability occurs because `Rack::Static` does not properly sanitize user-supplied paths before serving files. Specifically, encoded path traversal sequences are not correctly validated, allowing attackers to access files outside the designated static file directory. ## Impact By exploiting this vulnerability, an attacker can gain access to all files under the specified `root:` directory, provided they are able to determine then path of the file. ## Mitigation - Update to the latest version of Rack, or - Remove usage of `Rack::Static`, or - Ensure that `root:` points at a directory path which only contains files which should be accessed publicly. It is likely that a CDN or similar static file server would also mitigate the issue.
Metadata
Created: 2025-03-10T22:19:30Z
Modified: 2025-03-14T20:28:41Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/03/GHSA-7wqh-767x-r66v/GHSA-7wqh-767x-r66v.json
CWE IDs: ["CWE-23"]
Alternative ID: GHSA-7wqh-767x-r66v
Finding: F063
Auto approve: 1