First published: Wed Feb 12 2025(Updated: )
## Summary `Rack::CommonLogger` can be exploited by crafting input that includes newline characters to manipulate log entries. The supplied proof-of-concept demonstrates injecting malicious content into logs. ## Details When a user provides the authorization credentials via `Rack::Auth::Basic`, if success, the username will be put in `env['REMOTE_USER']` and later be used by `Rack::CommonLogger` for logging purposes. The issue occurs when a server intentionally or unintentionally allows a user creation with the username contain CRLF and white space characters, or the server just want to log every login attempts. If an attacker enters a username with CRLF character, the logger will log the malicious username with CRLF characters into the logfile. ## Impact Attackers can break log formats or insert fraudulent entries, potentially obscuring real activity or injecting malicious data into log files. ## Mitigation - Update to the latest version of Rack.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Rack CommonLogger | <2.2.11<3.0.12<3.1.11 | |
rubygems/rack | >=3.1<3.1.11 | 3.1.11 |
rubygems/rack | >=3.0<3.0.12 | 3.0.12 |
rubygems/rack | <2.2.11 | 2.2.11 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-25184 is classified as a medium severity vulnerability due to its potential for log manipulation.
To fix CVE-2025-25184, upgrade to Rack versions 2.2.11, 3.0.12, or 3.1.11 or later.
CVE-2025-25184 affects versions of Rack prior to 2.2.11, 3.0.12, and 3.1.11.
CVE-2025-25184 is a log injection vulnerability that can manipulate log entries.
Yes, a proof-of-concept demonstrating the exploitation of CVE-2025-25184 is available.