There is a possible shell escape sequence injection vulnerability in the Lint
and CommonLogger components of Rack. This vulnerability has been assigned the
CVE identifier CVE-2022-30123.
Versions Affected: All.
Not affected: None
Fixed Versions: 2.0.9.1, 2.1.4.1, 2.2.3.1
Carefully crafted requests can cause shell escape sequences to be written to
the terminal via Rack’s Lint middleware and CommonLogger middleware. These
escape sequences can be leveraged to possibly execute commands in the victim’s
terminal.
Impacted applications will have either of these middleware installed, and
vulnerable apps may have something like this:
use Rack::Lint
Or
use Rack::CommonLogger
All users running an affected release should either upgrade or use one of the
workarounds immediately.
Remove these middleware from your application
discuss.rubyonrails.org/t/cve-2022-30123-possible-shell-escape-sequence-injection-vulnerability-in-rack/80728
github.com/rack/rack
github.com/rack/rack/commit/b426cc224908ec6ed6eb8729325392b048215d88
github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2022-30123.yml
groups.google.com/g/ruby-security-ann/c/LWB10kWzag8
nvd.nist.gov/vuln/detail/CVE-2022-30123
security.gentoo.org/glsa/202310-18
security.netapp.com/advisory/ntap-20231208-0011
www.debian.org/security/2023/dsa-5530