-
CVSS Score
-Basic Information
CVE ID
-
GHSA ID
-
EPSS Score
-
CWE
-
Published
-
Updated
-
KEV Status
-
Technology
-
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| rack | rubygems | < 2.2.11 | 2.2.11 |
| rack | rubygems | >= 3.0, < 3.0.12 | 3.0.12 |
| rack | rubygems | >= 3.1, < 3.1.10 | 3.1.10 |
The vulnerability stems from Rack::CommonLogger's logging logic handling user-supplied usernames. The commit diff shows: 1) The FORMAT string's trailing newline was removed, 2) The regex in msg.gsub! was changed from excluding newlines (/[^[:print:]\n]/) to escaping all non-printables, and 3) A forced newline was appended after sanitization. This indicates the pre-patch log method failed to escape CRLF characters in user-controlled fields like REMOTE_USER, allowing log format manipulation. The test additions explicitly verify newline escaping in usernames, confirming this was the attack vector.
KEV Misses 88% of Exploited CVEs- Get the report