gsd-2022-30123
Vulnerability from gsd
Modified
2022-06-27 00:00
Details
There is a possible shell escape sequence injection vulnerability in the Lint and CommonLogger components of Rack. This vulnerability has been assigned the CVE identifier CVE-2022-30123. Versions Affected: All. Not affected: None Fixed Versions: 2.0.9.1, 2.1.4.1, 2.2.3.1 ## Impact Carefully crafted requests can cause shell escape sequences to be written to the terminal via Rack's Lint middleware and CommonLogger middleware. These escape sequences can be leveraged to possibly execute commands in the victim's terminal. Impacted applications will have either of these middleware installed, and vulnerable apps may have something like this: ``` use Rack::Lint ``` Or ``` use Rack::CommonLogger ``` All users running an affected release should either upgrade or use one of the workarounds immediately. ## Workarounds Remove these middleware from your application
Aliases



{
  "GSD": {
    "alias": "CVE-2022-30123",
    "id": "GSD-2022-30123",
    "references": [
      "https://www.suse.com/security/cve/CVE-2022-30123.html",
      "https://advisories.mageia.org/CVE-2022-30123.html",
      "https://access.redhat.com/errata/RHSA-2022:7343",
      "https://access.redhat.com/errata/RHSA-2023:0632",
      "https://ubuntu.com/security/CVE-2022-30123"
    ]
  },
  "gsd": {
    "metadata": {
      "exploitCode": "unknown",
      "remediation": "unknown",
      "reportConfidence": "confirmed",
      "type": "vulnerability"
    },
    "osvSchema": {
      "affected": [
        {
          "package": {
            "ecosystem": "RubyGems",
            "name": "rack",
            "purl": "pkg:gem/rack"
          }
        }
      ],
      "aliases": [
        "CVE-2022-30123",
        "GHSA-wq4h-7r42-5hrr"
      ],
      "details": "There is a possible shell escape sequence injection vulnerability in the Lint\nand CommonLogger components of Rack.  This vulnerability has been assigned the\nCVE identifier CVE-2022-30123.\n\nVersions Affected:  All.\nNot affected:       None\nFixed Versions:     2.0.9.1, 2.1.4.1, 2.2.3.1\n\n## Impact\nCarefully crafted requests can cause shell escape sequences to be written to\nthe terminal via Rack\u0027s Lint middleware and CommonLogger middleware.  These\nescape sequences can be leveraged to possibly execute commands in the victim\u0027s\nterminal.\n\nImpacted applications will have either of these middleware installed, and\nvulnerable apps may have something like this:\n\n```\nuse Rack::Lint\n```\n\nOr\n\n```\nuse Rack::CommonLogger\n```\n\nAll users running an affected release should either upgrade or use one of the\nworkarounds immediately.\n\n## Workarounds\nRemove these middleware from your application\n",
      "id": "GSD-2022-30123",
      "modified": "2022-06-27T00:00:00.000Z",
      "published": "2022-06-27T00:00:00.000Z",
      "references": [
        {
          "type": "WEB",
          "url": "https://groups.google.com/g/ruby-security-ann/c/LWB10kWzag8"
        }
      ],
      "schema_version": "1.4.0",
      "severity": [
        {
          "score": 10.0,
          "type": "CVSS_V3"
        }
      ],
      "summary": "Possible shell escape sequence injection vulnerability in Rack"
    }
  },
  "namespaces": {
    "cve.org": {
      "CVE_data_meta": {
        "ASSIGNER": "support@hackerone.com",
        "ID": "CVE-2022-30123",
        "STATE": "PUBLIC"
      },
      "affects": {
        "vendor": {
          "vendor_data": [
            {
              "product": {
                "product_data": [
                  {
                    "product_name": "https://github.com/rack/rack",
                    "version": {
                      "version_data": [
                        {
                          "version_value": "2.0.9.1, 2.1.4.1, 2.2.3.1"
                        }
                      ]
                    }
                  }
                ]
              },
              "vendor_name": "n/a"
            }
          ]
        }
      },
      "data_format": "MITRE",
      "data_type": "CVE",
      "data_version": "4.0",
      "description": {
        "description_data": [
          {
            "lang": "eng",
            "value": "A sequence injection vulnerability exists in Rack \u003c2.0.9.1, \u003c2.1.4.1 and \u003c2.2.3.1 which could allow is a possible shell escape in the Lint and CommonLogger components of Rack."
          }
        ]
      },
      "problemtype": {
        "problemtype_data": [
          {
            "description": [
              {
                "lang": "eng",
                "value": "Improper Neutralization of Escape, Meta, or Control Sequences (CWE-150)"
              }
            ]
          }
        ]
      },
      "references": {
        "reference_data": [
          {
            "name": "https://discuss.rubyonrails.org/t/cve-2022-30123-possible-shell-escape-sequence-injection-vulnerability-in-rack/80728",
            "refsource": "MISC",
            "url": "https://discuss.rubyonrails.org/t/cve-2022-30123-possible-shell-escape-sequence-injection-vulnerability-in-rack/80728"
          },
          {
            "name": "DSA-5530",
            "refsource": "DEBIAN",
            "url": "https://www.debian.org/security/2023/dsa-5530"
          },
          {
            "name": "GLSA-202310-18",
            "refsource": "GENTOO",
            "url": "https://security.gentoo.org/glsa/202310-18"
          },
          {
            "name": "https://security.netapp.com/advisory/ntap-20231208-0011/",
            "refsource": "CONFIRM",
            "url": "https://security.netapp.com/advisory/ntap-20231208-0011/"
          }
        ]
      }
    },
    "github.com/rubysec/ruby-advisory-db": {
      "cve": "2022-30123",
      "cvss_v3": 10.0,
      "date": "2022-06-27",
      "description": "There is a possible shell escape sequence injection vulnerability in the Lint\nand CommonLogger components of Rack.  This vulnerability has been assigned the\nCVE identifier CVE-2022-30123.\n\nVersions Affected:  All.\nNot affected:       None\nFixed Versions:     2.0.9.1, 2.1.4.1, 2.2.3.1\n\n## Impact\nCarefully crafted requests can cause shell escape sequences to be written to\nthe terminal via Rack\u0027s Lint middleware and CommonLogger middleware.  These\nescape sequences can be leveraged to possibly execute commands in the victim\u0027s\nterminal.\n\nImpacted applications will have either of these middleware installed, and\nvulnerable apps may have something like this:\n\n```\nuse Rack::Lint\n```\n\nOr\n\n```\nuse Rack::CommonLogger\n```\n\nAll users running an affected release should either upgrade or use one of the\nworkarounds immediately.\n\n## Workarounds\nRemove these middleware from your application\n",
      "gem": "rack",
      "ghsa": "wq4h-7r42-5hrr",
      "patched_versions": [
        "~\u003e 2.0.9, \u003e= 2.0.9.1",
        "~\u003e 2.1.4, \u003e= 2.1.4.1",
        "\u003e= 2.2.3.1"
      ],
      "title": "Possible shell escape sequence injection vulnerability in Rack",
      "url": "https://groups.google.com/g/ruby-security-ann/c/LWB10kWzag8"
    },
    "gitlab.com": {
      "advisories": [
        {
          "affected_range": "\u003c2.0.9.1||\u003e=2.1.0 \u003c2.1.4.1||\u003e=2.2.0 \u003c2.2.3.1",
          "affected_versions": "All versions before 2.0.9.1, all versions starting from 2.1.0 before 2.1.4.1, all versions starting from 2.2.0 before 2.2.3.1",
          "cvss_v3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
          "cwe_ids": [
            "CWE-1035",
            "CWE-937",
            "CWE-150",
            "CWE-78"
          ],
          "date": "2022-12-07",
          "description": "A sequence injection vulnerability exists in Rack \u003c2.0.9.1, \u003c2.1.4.1 and \u003c2.2.3.1 which could allow is a possible shell escape in the Lint and CommonLogger components of Rack.",
          "fixed_versions": [
            "2.0.9.1",
            "2.1.4.1",
            "2.2.3.1"
          ],
          "identifier": "CVE-2022-30123",
          "identifiers": [
            "CVE-2022-30123",
            "GHSA-wq4h-7r42-5hrr",
            "GMS-2022-1644"
          ],
          "not_impacted": "All versions starting from 2.0.9.1 before 2.1.0, all versions starting from 2.1.4.1 before 2.2.0, all versions starting from 2.2.3.1",
          "package_slug": "gem/rack",
          "pubdate": "2022-12-05",
          "solution": "Upgrade to versions 2.0.9.1, 2.1.4.1, 2.2.3.1 or above.",
          "title": "Improper Neutralization of Escape, Meta, or Control Sequences",
          "urls": [
            "https://nvd.nist.gov/vuln/detail/CVE-2022-30123",
            "https://discuss.rubyonrails.org/t/cve-2022-30123-possible-shell-escape-sequence-injection-vulnerability-in-rack/80728",
            "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2022-30123.yml",
            "https://groups.google.com/g/ruby-security-ann/c/LWB10kWzag8",
            "https://github.com/advisories/GHSA-wq4h-7r42-5hrr"
          ],
          "uuid": "cd1f3f9e-a685-4106-8dff-125e7cf1ea8d"
        },
        {
          "affected_range": "\u003c0",
          "affected_versions": "All versions up to 2.0.9.0, all versions starting from 2.1 up to 2.1.4.0, all versions starting from 2.2 up to 2.2.3.0",
          "cwe_ids": [
            "CWE-1035",
            "CWE-78",
            "CWE-937"
          ],
          "date": "2022-05-27",
          "description": "Carefully crafted requests can cause shell escape sequences to be written to the terminal via Rack\u0027s Lint middleware and CommonLogger middleware. These escape sequences can be leveraged to possibly execute commands in the victim\u0027s terminal.",
          "fixed_versions": [
            "2.0.9.1",
            "2.1.4.1",
            "2.2.3.1"
          ],
          "identifier": "GMS-2022-1644",
          "identifiers": [
            "GHSA-wq4h-7r42-5hrr",
            "GMS-2022-1644",
            "CVE-2022-30123"
          ],
          "not_impacted": "All versions after 2.0.9.0 before 2.1, all versions after 2.1.4.0 before 2.2, all versions after 2.2.3.0",
          "package_slug": "gem/rack",
          "pubdate": "2022-05-27",
          "solution": "Upgrade to versions 2.0.9.1, 2.1.4.1, 2.2.3.1 or above.",
          "title": "Duplicate of ./gem/rack/CVE-2022-30123.yml",
          "urls": [
            "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2022-30123.yml",
            "https://groups.google.com/g/ruby-security-ann/c/LWB10kWzag8",
            "https://github.com/advisories/GHSA-wq4h-7r42-5hrr"
          ],
          "uuid": "60b5a27f-4e4d-4ab4-8ae7-74b4b212e177"
        }
      ]
    },
    "nvd.nist.gov": {
      "configurations": {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:rack_project:rack:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndExcluding": "2.2.3.1",
                "versionStartIncluding": "2.2.0",
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:rack_project:rack:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndExcluding": "2.1.4.1",
                "versionStartIncluding": "2.1.0",
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:rack_project:rack:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndExcluding": "2.0.9.1",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          },
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      },
      "cve": {
        "CVE_data_meta": {
          "ASSIGNER": "support@hackerone.com",
          "ID": "CVE-2022-30123"
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "en",
              "value": "A sequence injection vulnerability exists in Rack \u003c2.0.9.1, \u003c2.1.4.1 and \u003c2.2.3.1 which could allow is a possible shell escape in the Lint and CommonLogger components of Rack."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "en",
                  "value": "NVD-CWE-Other"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://discuss.rubyonrails.org/t/cve-2022-30123-possible-shell-escape-sequence-injection-vulnerability-in-rack/80728",
              "refsource": "MISC",
              "tags": [
                "Third Party Advisory"
              ],
              "url": "https://discuss.rubyonrails.org/t/cve-2022-30123-possible-shell-escape-sequence-injection-vulnerability-in-rack/80728"
            },
            {
              "name": "DSA-5530",
              "refsource": "DEBIAN",
              "tags": [
                "Third Party Advisory"
              ],
              "url": "https://www.debian.org/security/2023/dsa-5530"
            },
            {
              "name": "GLSA-202310-18",
              "refsource": "GENTOO",
              "tags": [
                "Third Party Advisory"
              ],
              "url": "https://security.gentoo.org/glsa/202310-18"
            },
            {
              "name": "https://security.netapp.com/advisory/ntap-20231208-0011/",
              "refsource": "",
              "tags": [],
              "url": "https://security.netapp.com/advisory/ntap-20231208-0011/"
            }
          ]
        }
      },
      "impact": {
        "baseMetricV3": {
          "cvssV3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 10.0,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "exploitabilityScore": 3.9,
          "impactScore": 6.0
        }
      },
      "lastModifiedDate": "2023-12-08T22:15Z",
      "publishedDate": "2022-12-05T22:15Z"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading...

Loading...