Lucene search

K
githubGitHub Advisory DatabaseGHSA-WQ4H-7R42-5HRR
HistoryMay 27, 2022 - 4:36 p.m.

Possible shell escape sequence injection vulnerability in Rack

2022-05-2716:36:51
CWE-150
GitHub Advisory Database
github.com
25

10 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

0.005 Low

EPSS

Percentile

75.5%

There is a possible shell escape sequence injection vulnerability in the Lint
and CommonLogger components of Rack. This vulnerability has been assigned the
CVE identifier CVE-2022-30123.

Versions Affected: All.
Not affected: None
Fixed Versions: 2.0.9.1, 2.1.4.1, 2.2.3.1

Impact

Carefully crafted requests can cause shell escape sequences to be written to
the terminal via Rack’s Lint middleware and CommonLogger middleware. These
escape sequences can be leveraged to possibly execute commands in the victim’s
terminal.

Impacted applications will have either of these middleware installed, and
vulnerable apps may have something like this:

use Rack::Lint

Or

use Rack::CommonLogger

All users running an affected release should either upgrade or use one of the
workarounds immediately.

Workarounds

Remove these middleware from your application

Affected configurations

Vulners
Node
rack_projectrackRange2.2.3.0
OR
rack_projectrackRange2.1.4.0
OR
rack_projectrackRange2.0.9.0
CPENameOperatorVersion
rackle2.2.3.0
rackle2.1.4.0
rackle2.0.9.0

10 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

0.005 Low

EPSS

Percentile

75.5%