Escape Sequence Injection vulnerability in Rack lead to Possible Log Injection
Package
Affected versions
< 2.2.12
>= 3.0, < 3.0.13
>= 3.1, < 3.1.11
Patched versions
2.2.12
3.0.13
3.1.11
Description
Published to the GitHub Advisory Database
Mar 4, 2025
Reviewed
Mar 4, 2025
Published by the National Vulnerability Database
Mar 4, 2025
Last updated
Mar 5, 2025
Summary
Rack::Sendfile
can be exploited by crafting input that includes newline characters to manipulate log entries.Details
The
Rack::Sendfile
middleware logs unsanitized header values from theX-Sendfile-Type
header. An attacker can exploit this by injecting escape sequences (such as newline characters) into the header, resulting in log injection.Impact
This vulnerability can distort log files, obscure attack traces, and complicate security auditing.
Mitigation
Rack::Sendfile
.References