Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:deb/debian/ruby-rack@3.1.12-1?distro=trixie
purl pkg:deb/debian/ruby-rack@3.1.12-1?distro=trixie
Vulnerabilities affecting this package (0)
Vulnerability Summary Fixed by
This package is not known to be affected by vulnerabilities.
Vulnerabilities fixed by this package (3)
Vulnerability Summary Aliases
VCID-7p12-ejdu-uqgy Escape Sequence Injection vulnerability in Rack lead to Possible Log Injection ## Summary `Rack::Sendfile` can be exploited by crafting input that includes newline characters to manipulate log entries. ## Details The `Rack::Sendfile` middleware logs unsanitized header values from the `X-Sendfile-Type` header. An attacker can exploit this by injecting escape sequences (such as newline characters) into the header, resulting in log injection. ## Impact This vulnerability can distort log files, obscure attack traces, and complicate security auditing. ## Mitigation - Update to the latest version of Rack, or - Remove usage of `Rack::Sendfile`. CVE-2025-27111
GHSA-8cgq-6mh2-7j6v
VCID-w732-52bx-2qf8 Possible Log Injection in Rack::CommonLogger ## Summary `Rack::CommonLogger` can be exploited by crafting input that includes newline characters to manipulate log entries. The supplied proof-of-concept demonstrates injecting malicious content into logs. ## Details When a user provides the authorization credentials via `Rack::Auth::Basic`, if success, the username will be put in `env['REMOTE_USER']` and later be used by `Rack::CommonLogger` for logging purposes. The issue occurs when a server intentionally or unintentionally allows a user creation with the username contain CRLF and white space characters, or the server just want to log every login attempts. If an attacker enters a username with CRLF character, the logger will log the malicious username with CRLF characters into the logfile. ## Impact Attackers can break log formats or insert fraudulent entries, potentially obscuring real activity or injecting malicious data into log files. ## Mitigation - Update to the latest version of Rack. CVE-2025-25184
GHSA-7g2v-jj9q-g3rg
VCID-wt7k-s1yd-nke6 Local File Inclusion in Rack::Static ## Summary `Rack::Static` can serve files under the specified `root:` even if `urls:` are provided, which may expose other files under the specified `root:` unexpectedly. ## Details The vulnerability occurs because `Rack::Static` does not properly sanitize user-supplied paths before serving files. Specifically, encoded path traversal sequences are not correctly validated, allowing attackers to access files outside the designated static file directory. ## Impact By exploiting this vulnerability, an attacker can gain access to all files under the specified `root:` directory, provided they are able to determine then path of the file. ## Mitigation - Update to the latest version of Rack, or - Remove usage of `Rack::Static`, or - Ensure that `root:` points at a directory path which only contains files which should be accessed publicly. It is likely that a CDN or similar static file server would also mitigate the issue. CVE-2025-27610
GHSA-7wqh-767x-r66v

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-16T09:38:58.059789+00:00 Debian Importer Fixing VCID-w732-52bx-2qf8 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:00:37.059046+00:00 Debian Importer Fixing VCID-wt7k-s1yd-nke6 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:42:55.964788+00:00 Debian Importer Fixing VCID-7p12-ejdu-uqgy https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-12T18:15:46.386433+00:00 Debian Importer Fixing VCID-7p12-ejdu-uqgy https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:25:19.578886+00:00 Debian Importer Fixing VCID-w732-52bx-2qf8 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:02:27.558004+00:00 Debian Importer Fixing VCID-wt7k-s1yd-nke6 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-03T07:52:20.519830+00:00 Debian Importer Fixing VCID-wt7k-s1yd-nke6 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:52:20.446745+00:00 Debian Importer Fixing VCID-7p12-ejdu-uqgy https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:52:20.373142+00:00 Debian Importer Fixing VCID-w732-52bx-2qf8 https://security-tracker.debian.org/tracker/data/json 38.1.0