Skip to content

Commit 3e2cd72

Browse files
jasnowpostmodern
authored andcommitted
6 enhanced advisories; 1 brand new advisory
1 parent 44593ed commit 3e2cd72

File tree

7 files changed

+55
-0
lines changed

7 files changed

+55
-0
lines changed

Diff for: gems/actionpack/CVE-2024-54133.yml

+1
Original file line numberDiff line numberDiff line change
@@ -41,5 +41,6 @@ patched_versions:
4141
related:
4242
url:
4343
- https://nvd.nist.gov/vuln/detail/CVE-2024-54133
44+
- https://hackerone.com/reports/2905532
4445
- https://github.com/rails/rails/security/advisories/GHSA-vfm5-rmrh-j26v
4546
- https://github.com/advisories/GHSA-vfm5-rmrh-j26v

Diff for: gems/net-imap/CVE-2025-25186.yml

+1
Original file line numberDiff line numberDiff line change
@@ -150,6 +150,7 @@ patched_versions:
150150
related:
151151
url:
152152
- https://nvd.nist.gov/vuln/detail/CVE-2025-25186
153+
- https://www.ruby-lang.org/en/news/2025/02/10/dos-net-imap-cve-2025-25186
153154
- https://github.com/ruby/net-imap/security/advisories/GHSA-7fc5-f82f-cx69
154155
- https://github.com/ruby/net-imap/commit/70e3ddd071a94e450b3238570af482c296380b35
155156
- https://github.com/ruby/net-imap/commit/c8c5a643739d2669f0c9a6bb9770d0c045fd74a3

Diff for: gems/rack/CVE-2025-25184.yml

+48
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,48 @@
1+
---
2+
gem: rack
3+
cve: 2025-25184
4+
ghsa: 7g2v-jj9q-g3rg
5+
url: https://github.com/rack/rack/security/advisories/GHSA-7g2v-jj9q-g3rg
6+
title: Possible Log Injection in Rack::CommonLogger
7+
date: 2025-02-12
8+
description: |
9+
## Summary
10+
11+
`Rack::CommonLogger` can be exploited by crafting input that includes
12+
newline characters to manipulate log entries. The supplied
13+
proof-of-concept demonstrates injecting malicious content into logs.
14+
15+
## Details
16+
17+
When a user provides the authorization credentials via
18+
`Rack::Auth::Basic`, if success, the username will be put in
19+
`env['REMOTE_USER']` and later be used by `Rack::CommonLogger`
20+
for logging purposes.
21+
22+
The issue occurs when a server intentionally or unintentionally
23+
allows a user creation with the username contain CRLF and white
24+
space characters, or the server just want to log every login
25+
attempts. If an attacker enters a username with CRLF character,
26+
the logger will log the malicious username with CRLF characters
27+
into the logfile.
28+
29+
## Impact
30+
31+
Attackers can break log formats or insert fraudulent entries,
32+
potentially obscuring real activity or injecting malicious data
33+
into log files.
34+
35+
## Mitigation
36+
37+
- Update to the latest version of Rack.
38+
cvss_v4: 5.7
39+
patched_versions:
40+
- "~> 2.2.11"
41+
- "~> 3.0.12"
42+
- ">= 3.1.10"
43+
related:
44+
url:
45+
- https://nvd.nist.gov/vuln/detail/CVE-2025-25184
46+
- https://github.com/rack/rack/security/advisories/GHSA-7g2v-jj9q-g3rg
47+
- https://github.com/rack/rack/commit/074ae244430cda05c27ca91cda699709cfb3ad8e
48+
- https://github.com/advisories/GHSA-7g2v-jj9q-g3rg

Diff for: gems/rails-html-sanitizer/CVE-2024-53986.yml

+1
Original file line numberDiff line numberDiff line change
@@ -110,6 +110,7 @@ patched_versions:
110110
related:
111111
url:
112112
- https://nvd.nist.gov/vuln/detail/CVE-2024-53986
113+
- https://hackerone.com/reports/2931636
113114
- https://github.com/rails/rails-html-sanitizer/blob/v1.6.1/CHANGELOG.md
114115
- https://github.com/rails/rails-html-sanitizer/security/advisories/GHSA-638j-pmjw-jq48
115116
- https://github.com/rails/rails-html-sanitizer/commit/f02ffbb8465e73920b6de0da940f5530f855965e

Diff for: gems/rails-html-sanitizer/CVE-2024-53987.yml

+2
Original file line numberDiff line numberDiff line change
@@ -109,6 +109,8 @@ patched_versions:
109109
related:
110110
url:
111111
- https://nvd.nist.gov/vuln/detail/CVE-2024-53987
112+
- https://hackerone.com/reports/2931639
113+
- https://hackerone.com/reports/2931688
112114
- https://github.com/rails/rails-html-sanitizer/security/advisories/GHSA-2x5m-9ch4-qgrr
113115
- https://github.com/rails/rails-html-sanitizer/commit/f02ffbb8465e73920b6de0da940f5530f855965e
114116
- https://github.com/advisories/GHSA-2x5m-9ch4-qgrr

Diff for: gems/rails-html-sanitizer/CVE-2024-53988.yml

+1
Original file line numberDiff line numberDiff line change
@@ -119,6 +119,7 @@ patched_versions:
119119
related:
120120
url:
121121
- https://nvd.nist.gov/vuln/detail/CVE-2024-53988
122+
- https://hackerone.com/reports/2931710
122123
- https://github.com/rails/rails-html-sanitizer/security/advisories/GHSA-cfjx-w229-hgx5
123124
- https://github.com/rails/rails-html-sanitizer/commit/a0a3e8b76b696446ffc6bffcff3bc7b7c6393c72
124125
- https://github.com/advisories/GHSA-cfjx-w229-hgx5

Diff for: gems/rails-html-sanitizer/CVE-2024-53989.yml

+1
Original file line numberDiff line numberDiff line change
@@ -109,6 +109,7 @@ patched_versions:
109109
related:
110110
url:
111111
- https://nvd.nist.gov/vuln/detail/CVE-2024-53989
112+
- https://hackerone.com/reports/2931691
112113
- https://github.com/rails/rails-html-sanitizer/security/advisories/GHSA-rxv5-gxqc-xx8g
113114
- https://github.com/rails/rails-html-sanitizer/commit/16251735e36ebdc302e2f90f2a39cad56879414f
114115
- https://github.com/advisories/GHSA-rxv5-gxqc-xx8g

0 commit comments

Comments
 (0)