// For flags

CVE-2022-30123

rubygem-rack: crafted requests can cause shell escape sequences

Severity Score

10.0
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

A sequence injection vulnerability exists in Rack <2.0.9.1, <2.1.4.1 and <2.2.3.1 which could allow is a possible shell escape in the Lint and CommonLogger components of Rack.

Existe una vulnerabilidad de inyección de secuencia en Rack &lt;2.0.9.1, &lt;2.1.4.1 y &lt;2.2.3.1 que podría permitir un posible escape de shell en los componentes Lint y CommonLogger de Rack.

A flaw was found in ruby gem-rack. This flaw allows a malicious actor to craft requests that can cause shell escape sequences to be written to the terminal via rack's `Lint` middleware and `CommonLogger` middleware. This issue can leverage these escape sequences to execute commands in the victim's terminal.

It was discovered that Rack was not properly parsing data when processing multipart POST requests. If a user or automated system were tricked into sending a specially crafted multipart POST request to an application using Rack, a remote attacker could possibly use this issue to cause a denial of service. It was discovered that Rack was not properly escaping untrusted data when performing logging operations, which could cause shell escaped sequences to be written to a terminal. If a user or automated system were tricked into sending a specially crafted request to an application using Rack, a remote attacker could possibly use this issue to execute arbitrary code in the machine running the application.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2022-05-02 CVE Reserved
  • 2022-11-03 CVE Published
  • 2024-08-03 CVE Updated
  • 2025-04-02 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-150: Improper Neutralization of Escape, Meta, or Control Sequences
  • CWE-179: Incorrect Behavior Order: Early Validation
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Rack Project
Search vendor "Rack Project"
Rack
Search vendor "Rack Project" for product "Rack"
< 2.0.9.1
Search vendor "Rack Project" for product "Rack" and version " < 2.0.9.1"
-
Affected
Rack Project
Search vendor "Rack Project"
Rack
Search vendor "Rack Project" for product "Rack"
>= 2.1.0 < 2.1.4.1
Search vendor "Rack Project" for product "Rack" and version " >= 2.1.0 < 2.1.4.1"
-
Affected
Rack Project
Search vendor "Rack Project"
Rack
Search vendor "Rack Project" for product "Rack"
>= 2.2.0 < 2.2.3.1
Search vendor "Rack Project" for product "Rack" and version " >= 2.2.0 < 2.2.3.1"
-
Affected
Debian
Search vendor "Debian"
Debian Linux
Search vendor "Debian" for product "Debian Linux"
11.0
Search vendor "Debian" for product "Debian Linux" and version "11.0"
-
Affected