Advisory Database
  • Advisories
  • Dependency Scanning
  1. gem
  2. ›
  3. rack
  4. ›
  5. CVE-2025-27111

CVE-2025-27111: Escape Sequence Injection vulnerability in Rack lead to Possible Log Injection

March 4, 2025 (updated March 5, 2025)

Rack::Sendfile can be exploited by crafting input that includes newline characters to manipulate log entries.

References

  • github.com/advisories/GHSA-8cgq-6mh2-7j6v
  • github.com/rack/rack
  • github.com/rack/rack/commit/803aa221e8302719715e224f4476e438f2531a53
  • github.com/rack/rack/commit/aeac570bb8080ca7b53b7f2e2f67498be7ebd30b
  • github.com/rack/rack/commit/b13bc6bfc7506aca3478dc5ac1c2ec6fc53f82a3
  • github.com/rack/rack/security/advisories/GHSA-8cgq-6mh2-7j6v
  • github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2025-27111.yml
  • nvd.nist.gov/vuln/detail/CVE-2025-27111

Code Behaviors & Features

Detect and mitigate CVE-2025-27111 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 2.2.12, all versions starting from 3.0 before 3.0.13, all versions starting from 3.1 before 3.1.11

Fixed versions

  • 2.2.12
  • 3.0.13
  • 3.1.11

Solution

Upgrade to versions 2.2.12, 3.0.13, 3.1.11 or above.

Weakness

  • CWE-117: Improper Output Neutralization for Logs
  • CWE-93: Improper Neutralization of CRLF Sequences ('CRLF Injection')

Source file

gem/rack/CVE-2025-27111.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:15:50 +0000.