ghsa-wq4h-7r42-5hrr
Vulnerability from github
There is a possible shell escape sequence injection vulnerability in the Lint and CommonLogger components of Rack. This vulnerability has been assigned the CVE identifier CVE-2022-30123.
Versions Affected: All. Not affected: None Fixed Versions: 2.0.9.1, 2.1.4.1, 2.2.3.1
Impact
Carefully crafted requests can cause shell escape sequences to be written to the terminal via Rack's Lint middleware and CommonLogger middleware. These escape sequences can be leveraged to possibly execute commands in the victim's terminal.
Impacted applications will have either of these middleware installed, and vulnerable apps may have something like this:
use Rack::Lint
Or
use Rack::CommonLogger
All users running an affected release should either upgrade or use one of the workarounds immediately.
Workarounds
Remove these middleware from your application
{ "affected": [ { "database_specific": { "last_known_affected_version_range": "\u003c= 2.0.9.0" }, "package": { "ecosystem": "RubyGems", "name": "rack" }, "ranges": [ { "events": [ { "introduced": "0" }, { "fixed": "2.0.9.1" } ], "type": "ECOSYSTEM" } ] }, { "database_specific": { "last_known_affected_version_range": "\u003c= 2.1.4.0" }, "package": { "ecosystem": "RubyGems", "name": "rack" }, "ranges": [ { "events": [ { "introduced": "2.1" }, { "fixed": "2.1.4.1" } ], "type": "ECOSYSTEM" } ] }, { "database_specific": { "last_known_affected_version_range": "\u003c= 2.2.3.0" }, "package": { "ecosystem": "RubyGems", "name": "rack" }, "ranges": [ { "events": [ { "introduced": "2.2" }, { "fixed": "2.2.3.1" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2022-30123" ], "database_specific": { "cwe_ids": [ "CWE-150" ], "github_reviewed": true, "github_reviewed_at": "2022-05-27T16:36:51Z", "nvd_published_at": "2022-12-05T22:15:00Z", "severity": "CRITICAL" }, "details": "There is a possible shell escape sequence injection vulnerability in the Lint\nand CommonLogger components of Rack. This vulnerability has been assigned the\nCVE identifier CVE-2022-30123.\n\nVersions Affected: All.\nNot affected: None\nFixed Versions: 2.0.9.1, 2.1.4.1, 2.2.3.1\n\n## Impact\nCarefully crafted requests can cause shell escape sequences to be written to\nthe terminal via Rack\u0027s Lint middleware and CommonLogger middleware. These\nescape sequences can be leveraged to possibly execute commands in the victim\u0027s\nterminal.\n\nImpacted applications will have either of these middleware installed, and\nvulnerable apps may have something like this:\n\n```\nuse Rack::Lint\n```\n\nOr\n\n```\nuse Rack::CommonLogger\n```\n\nAll users running an affected release should either upgrade or use one of the\nworkarounds immediately.\n\n## Workarounds\nRemove these middleware from your application\n", "id": "GHSA-wq4h-7r42-5hrr", "modified": "2022-12-07T14:37:27Z", "published": "2022-05-27T16:36:51Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-30123" }, { "type": "WEB", "url": "https://github.com/rack/rack/commit/b426cc224908ec6ed6eb8729325392b048215d88" }, { "type": "WEB", "url": "https://discuss.rubyonrails.org/t/cve-2022-30123-possible-shell-escape-sequence-injection-vulnerability-in-rack/80728" }, { "type": "PACKAGE", "url": "https://github.com/rack/rack" }, { "type": "WEB", "url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2022-30123.yml" }, { "type": "WEB", "url": "https://groups.google.com/g/ruby-security-ann/c/LWB10kWzag8" }, { "type": "WEB", "url": "https://security.gentoo.org/glsa/202310-18" }, { "type": "WEB", "url": "https://security.netapp.com/advisory/ntap-20231208-0011" }, { "type": "WEB", "url": "https://www.debian.org/security/2023/dsa-5530" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", "type": "CVSS_V3" } ], "summary": "Possible shell escape sequence injection vulnerability in Rack" }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.