{
  "threat_severity" : "Important",
  "public_date" : "2022-05-27T00:00:00Z",
  "bugzilla" : {
    "description" : "rubygem-rack: crafted requests can cause shell escape sequences",
    "id" : "2099524",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2099524"
  },
  "cvss3" : {
    "cvss3_base_score" : "10.0",
    "cvss3_scoring_vector" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
    "status" : "verified"
  },
  "cwe" : "CWE-179",
  "details" : [ "A sequence injection vulnerability exists in Rack <2.0.9.1, <2.1.4.1 and <2.2.3.1 which could allow is a possible shell escape in the Lint and CommonLogger components of Rack.", "A flaw was found in ruby gem-rack. This flaw allows a malicious actor to craft requests that can cause shell escape sequences to be written to the terminal via rack's `Lint` middleware and `CommonLogger` middleware. This issue can leverage these escape sequences to execute commands in the victim's terminal." ],
  "statement" : "- Because Red Hat OpenStack Platform 13.0 Operational Tools packaged the flawed code, but does not use its functionality, its Impact has been reduced to 'Low'.\n- To exploit this vulnerability, applications should have either of these middlewares 'Lint' or 'CommonLogger' installed, and vulnerable apps may have something like this: \n'use Rack::Lint' OR 'use Rack::CommonLogger'\nThe Red Hat products use the flawed code but don't use its functionality, Hence, the impact is set to Important.\n- Logging Subsystem for Red Hat OpenShift uses the vulnerable ruby gem-rack package in the openshift-logging/fluentd-rhel8 component to instantiate client-to-server communication. But, this component cannot receive any requests so exploitation by crafted request consumption is not possible. Therefore the impact of this vulnerability on the Logging Subsystem for Red Hat OpenShift is reduced to Moderate.",
  "affected_release" : [ {
    "product_name" : "Logging subsystem for Red Hat OpenShift 5.4",
    "release_date" : "2023-02-15T00:00:00Z",
    "advisory" : "RHSA-2023:0632",
    "cpe" : "cpe:/a:redhat:logging:5.4::el8",
    "package" : "openshift-logging/fluentd-rhel8:v1.14.5-51",
    "impact" : "moderate"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "release_date" : "2022-11-02T00:00:00Z",
    "advisory" : "RHSA-2022:7343",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7",
    "package" : "pcs-0:0.9.169-3.el7_9.3"
  }, {
    "product_name" : "Red Hat Gluster Storage 3.5 for RHEL 7",
    "release_date" : "2023-03-28T00:00:00Z",
    "advisory" : "RHSA-2023:1486",
    "cpe" : "cpe:/a:redhat:storage:3.5:wa:el7",
    "package" : "rubygem-rack-0:2.2.4-1.el7rhgs"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat OpenStack Platform 13 (Queens) Operational Tools",
    "fix_state" : "Will not fix",
    "package_name" : "rubygem-rack",
    "cpe" : "cpe:/a:redhat:openstack-optools:13",
    "impact" : "low"
  }, {
    "product_name" : "Red Hat Satellite 6",
    "fix_state" : "Not affected",
    "package_name" : "rubygem-rack",
    "cpe" : "cpe:/a:redhat:satellite:6"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2022-30123\nhttps://nvd.nist.gov/vuln/detail/CVE-2022-30123\nhttps://github.com/advisories/GHSA-wq4h-7r42-5hrr" ],
  "name" : "CVE-2022-30123",
  "csaw" : false
}