SB2025032612 - Debian update for ruby-rack
Published: March 26, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 3 secuirty vulnerabilities.
1) CRLF injection (CVE-ID: CVE-2025-25184)
The vulnerability allows a remote user to manipulate data log entries.
The vulnerability exists due to insufficient validation of attacker-supplied data in Rack::CommonLogger. A remote user can pass specially crafted authorization credentials containing CR-LF characters to the Rack::Auth::Basic method, which stores this info into the to the env['REMOTE_USER'] variable. If the application accepts CR-LF characters in user name, a remote user can manipulate data log entries.
2) Improper Output Neutralization for Logs (CVE-ID: CVE-2025-27111)
The vulnerability allows a remote attacker to manipulate log entries.
The vulnerability exists due to improper input validation of the X-Sendfile-Type header in Rack::Sendfile when handling. A remote attacker can send specially crafted data containing newline characters via the affected header and manipulate log files.
3) Path traversal (CVE-ID: CVE-2025-27610)
The vulnerability allows a remote attacker to perform directory traversal attacks.
The vulnerability exists due to input validation error when processing directory traversal sequences in Rack::Static. A remote attacker can read arbitrary files on the system.
Remediation
Install update from vendor's website.