First published: Fri May 27 2022(Updated: )
A flaw was found in ruby gem-rack. This flaw allows a malicious actor to craft requests that can cause shell escape sequences to be written to the terminal via rack's `Lint` middleware and `CommonLogger` middleware. This issue can leverage these escape sequences to execute commands in the victim's terminal.
Credit: support@hackerone.com support@hackerone.com support@hackerone.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/pcs | <0:0.9.169-3.el7_9.3 | 0:0.9.169-3.el7_9.3 |
redhat/rubygem-rack | <0:2.2.4-1.el7 | 0:2.2.4-1.el7 |
Rack Project Rack | <2.0.9.1 | |
Rack Project Rack | >=2.1.0<2.1.4.1 | |
Rack Project Rack | >=2.2.0<2.2.3.1 | |
Debian Debian Linux | =11.0 | |
rubygems/rack | >=2.2<=2.2.3.0 | 2.2.3.1 |
rubygems/rack | >=2.1<=2.1.4.0 | 2.1.4.1 |
rubygems/rack | <=2.0.9.0 | 2.0.9.1 |
redhat/rubygem-rack | <2.0.9.1 | 2.0.9.1 |
redhat/rubygem-rack | <2.1.4.1 | 2.1.4.1 |
redhat/rubygem-rack | <2.2.3.1 | 2.2.3.1 |
debian/ruby-rack | 2.1.4-3+deb11u2 2.2.6.4-1+deb12u1 2.2.7-1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2022-30123 is a shell escape sequence injection vulnerability in the Lint and CommonLogger components of Rack.
CVE-2022-30123 has a severity score of 10, which is classified as critical.
All versions of Rack are affected by CVE-2022-30123.
To fix CVE-2022-30123, update to the fixed versions: 2.0.9.1, 2.1.4.1, or 2.2.3.1.
You can find more information about CVE-2022-30123 in the following references: [Link 1](https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2022-30123.yml), [Link 2](https://bugzilla.redhat.com/show_bug.cgi/show_bug.cgi?id=2099525), [Link 3](https://rubygems.org/gems/rack).