{"vulnerability": "ghsa-7g2v-jj9q-g3rg", "sightings": [{"uuid": "dfa1d9ab-8355-4efa-9716-b3342528845f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "GHSA-7G2V-JJ9Q-G3RG", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/4508", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-25184\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: ## Summary\n\n`Rack::CommonLogger` can be exploited by crafting input that includes newline characters to manipulate log entries. The supplied proof-of-concept demonstrates injecting malicious content into logs.\n\n## Details\n\nWhen a user provides the authorization credentials via `Rack::Auth::Basic`, if success, the username will be put in `env['REMOTE_USER']` and later be used by `Rack::CommonLogger` for logging purposes.\n\nThe issue occurs when a server intentionally or unintentionally allows a user creation with the username contain CRLF and white space characters, or the server just want to log every login attempts. If an attacker enters a username with CRLF character, the logger will log the malicious username with CRLF characters into the logfile.\n\n## Impact\n\nAttackers can break log formats or insert fraudulent entries, potentially obscuring real activity or injecting malicious data into log files.\n\n## Mitigation\n\n- Update to the latest version of Rack.\n\ud83d\udccf Published: 2025-02-12T19:18:35Z\n\ud83d\udccf Modified: 2025-02-14T22:16:55Z\n\ud83d\udd17 References:\n1. https://github.com/rack/rack/security/advisories/GHSA-7g2v-jj9q-g3rg\n2. https://nvd.nist.gov/vuln/detail/CVE-2025-25184\n3. https://github.com/rack/rack/commit/074ae244430cda05c27ca91cda699709cfb3ad8e\n4. https://github.com/rack/rack\n5. https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2025-25184.yml", "creation_timestamp": "2025-02-14T23:10:45.000000Z"}, {"uuid": "4a83a287-7aae-4ca8-b0fc-eba12f7a9fcd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "GHSA-7g2v-jj9q-g3rg", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113991847229088447", "content": "", "creation_timestamp": "2025-02-12T16:25:52.354265Z"}]}