Rack::Sendfile
can be exploited by crafting input that includes newline characters to manipulate log entries.
The Rack::Sendfile
middleware logs unsanitized header values from the X-Sendfile-Type
header. An attacker can exploit this by injecting escape sequences (such as newline characters) into the header, resulting in log injection.
This vulnerability can distort log files, obscure attack traces, and complicate security auditing.
Rack::Sendfile
.{ "nvd_published_at": "2025-03-04T16:15:40Z", "cwe_ids": [ "CWE-117", "CWE-93" ], "severity": "MODERATE", "github_reviewed": true, "github_reviewed_at": "2025-03-04T15:27:06Z" }