By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Viral Trending contentViral Trending content
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
Reading: Researchers Identify Rack::Static Vulnerability Enabling Data Breaches in Ruby Servers
Notification Show More
Viral Trending contentViral Trending content
  • Home
  • Categories
    • World News
    • Politics
    • Sports
    • Celebrity
    • Business
    • Crypto
    • Tech News
    • Gaming News
    • Travel
  • Bookmarks
© 2024 All Rights reserved | Powered by Viraltrendingcontent
Viral Trending content > Blog > Tech News > Researchers Identify Rack::Static Vulnerability Enabling Data Breaches in Ruby Servers
Tech News

Researchers Identify Rack::Static Vulnerability Enabling Data Breaches in Ruby Servers

By Viral Trending Content 5 Min Read
Share
SHARE

Apr 25, 2025Ravie LakshmananVulnerability / Data Breach

Cybersecurity researchers have disclosed three security flaws in the Rack Ruby web server interface that, if successfully exploited, could enable attackers to gain unauthorized access to files, inject malicious data, and tamper with logs under certain conditions.

The vulnerabilities, flagged by cybersecurity vendor OPSWAT, are listed below –

  • CVE-2025-27610 (CVSS score: 7.5) – A path traversal vulnerability that could be used to gain access to all files under the specified root: directory, assuming an attacker can determine the paths to those files
  • CVE-2025-27111 (CVSS score: 6.9) – An improper neutralization of carriage return line feeds (CRLF) sequences and improper output neutralization for logs vulnerability that could be used to manipulate log entries and distort log files
  • CVE-2025-25184 (CVSS score: 5.7) – An improper neutralization of carriage return line feeds (CRLF) sequences and improper output neutralization for logs vulnerability that could be used to manipulate log entries and inject malicious data

Successful exploitation of the flaws could permit an attacker to obscure attack traces, read arbitrary files, and inject malicious code.

Cybersecurity

“Among these vulnerabilities, CVE-2025-27610 is particularly severe, as it could enable unauthenticated attackers to retrieve sensitive information, including configuration files, credentials, and confidential data, thereby leading to data breaches,” OPSWAT said in a report shared with The Hacker News.

The shortcoming stems from the fact that Rack::Static, a middleware that’s used to serve static content like JavaScript, stylesheets, and images, does not sanitize user-supplied paths before serving files, leading to a scenario where an attacker can provide a specially crafted path to access files outside of the static file directory.

“Specifically, when the :root parameter is not explicitly defined, Rack defaults this value to the current working directory by assigning it the value of Dir.pwd, implicitly designating it as the web root directory for the Rack application,” OPSWAT said.

As a result, if the :root option is either undefined or misconfigured relative to the :urls option, an unauthenticated attacker could weaponize CVE-2025-27610 through path traversal techniques to access sensitive files outside the intended web directory.

To mitigate the risk posed by the flaw, it’s advised to update to the latest version. If immediate patching is not an option, it’s recommended to remove usage of Rack::Static, or ensure that root: points at a directory path that only contains files that should be accessed publicly.

Critical Flaw in Infodraw Media Relay Service

The disclosure comes as a critical security defect has been unearthed in the Infodraw Media Relay Service (MRS) that allows reading or deletion of arbitrary files via a path traversal vulnerability (CVE-2025-43928, CVSS score: 9.8) in the username parameter in the login page of the system.

Infodraw is an Israeli maker of mobile video surveillance solutions that are used to transmit audio, video, and GPS data over telecommunications networks. According to the company’s website, its devices are used by law enforcement, private investigations, fleet management, and public transport in many countries.

Cybersecurity

“A trivial Path Traversal vulnerability allows it to read out any file from systems for unauthenticated attackers,” security researcher Tim Philipp Schäfers said in a statement shared with The Hacker News. “Furthermore an ‘Arbitrary File Deletion Vulnerability’ exists that allows attackers to delete any file from the system.”

The flaw, which enables login with a username like “../../../../,” affects both Windows and Linux versions of MRS. That said, the security defect continues to remain unpatched. Vulnerable systems in Belgium and Luxembourg have been taken offline following responsible disclosure.

“Affected organizations are primarily advised to take the application offline immediately (since, despite early warnings, no manufacturer patch is available, and it is considered possible that the vulnerability will be exploited by malicious actors in the near future),” Philipp Schäfers said.

“If this is not possible, systems should be further protected with additional measures (such as using a VPN or specific IP unlocking).”

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.

You Might Also Like

17 Giftable Subscription Boxes (2025), Tested and Reviewed

19 exciting healthcare companies currently hiring

The 12 Best Gifts for Every Kind of Golfer (2024)

Android 16: Release Date, New Features & Compatible Devices

University of Limerick spin-out Oscil wins Big Ideas Award at Enterprise Ireland’s Start-Up Day 2025

TAGGED: Cyber Security, Cybersecurity, data breach, Internet, Log Tampering, Path Traversal, Vulnerability
Share This Article
Facebook Twitter Copy Link
Previous Article Meloni-Zelensky meeting lasted almost an hour, Italian PM: ‘Russia shows willingness for peace’
Next Article DOGE Says US National Science Foundation Canceling Over $325 Million in DEI Research
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

- Advertisement -
Ad image

Latest News

‘Size does not matter’: Bhutan’s tiny sovereign wealth fund banks on green energy and Bitcoin
Business
Ledger secures Discord after hacker bot tried to steal seed phrases
Crypto
Sega’s finally got some Virtua Fighter (6?) news coming
Gaming News
17 Giftable Subscription Boxes (2025), Tested and Reviewed
Tech News
Putin Proposes Direct Peace Talks With Ukraine After Three Years Of War
World News
Celebrity Moms With Look-Alike Daughters: Reese, Ava & More
Celebrity
Bitcoin Returns To Consolidation Phase Ahead Of Projected Surge To $106K-$110K Range
Crypto

About Us

Welcome to Viraltrendingcontent, your go-to source for the latest updates on world news, politics, sports, celebrity, tech, travel, gaming, crypto news, and business news. We are dedicated to providing you with accurate, timely, and engaging content from around the globe.

Quick Links

  • Home
  • World News
  • Politics
  • Celebrity
  • Business
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
  • Sports
  • Crypto
  • Tech News
  • Gaming News
  • Travel

Trending News

cageside seats

Unlocking the Ultimate WWE Experience: Cageside Seats News 2024

‘Size does not matter’: Bhutan’s tiny sovereign wealth fund banks on green energy and Bitcoin

Investing £5 a day could help me build a second income of £329 a month!

cageside seats
Unlocking the Ultimate WWE Experience: Cageside Seats News 2024
May 22, 2024
‘Size does not matter’: Bhutan’s tiny sovereign wealth fund banks on green energy and Bitcoin
May 12, 2025
Investing £5 a day could help me build a second income of £329 a month!
March 27, 2024
Brussels unveils plans for a European Degree but struggles to explain why
March 27, 2024
© 2024 All Rights reserved | Powered by Vraltrendingcontent
  • About Us
  • Contact US
  • Disclaimer
  • Privacy Policy
  • Terms of Service
Welcome Back!

Sign in to your account

Lost your password?