{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2022-30123","assignerOrgId":"36234546-b8fa-4601-9d6f-f4e334aa8ea1","assignerShortName":"hackerone","dateUpdated":"2024-08-03T06:40:47.582Z","dateReserved":"2022-05-02T00:00:00.000Z","datePublished":"2022-12-05T00:00:00.000Z"},"containers":{"cna":{"providerMetadata":{"orgId":"36234546-b8fa-4601-9d6f-f4e334aa8ea1","shortName":"hackerone","dateUpdated":"2023-12-08T22:06:15.677Z"},"descriptions":[{"lang":"en","value":"A sequence injection vulnerability exists in Rack <2.0.9.1, <2.1.4.1 and <2.2.3.1 which could allow is a possible shell escape in the Lint and CommonLogger components of Rack."}],"affected":[{"vendor":"n/a","product":"https://github.com/rack/rack","versions":[{"version":"2.0.9.1, 2.1.4.1, 2.2.3.1","status":"affected"}]}],"references":[{"url":"https://discuss.rubyonrails.org/t/cve-2022-30123-possible-shell-escape-sequence-injection-vulnerability-in-rack/80728"},{"name":"DSA-5530","tags":["vendor-advisory"],"url":"https://www.debian.org/security/2023/dsa-5530"},{"name":"GLSA-202310-18","tags":["vendor-advisory"],"url":"https://security.gentoo.org/glsa/202310-18"},{"url":"https://security.netapp.com/advisory/ntap-20231208-0011/"}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"Improper Neutralization of Escape, Meta, or Control Sequences (CWE-150)","cweId":"CWE-150"}]}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T06:40:47.582Z"},"title":"CVE Program Container","references":[{"url":"https://discuss.rubyonrails.org/t/cve-2022-30123-possible-shell-escape-sequence-injection-vulnerability-in-rack/80728","tags":["x_transferred"]},{"name":"DSA-5530","tags":["vendor-advisory","x_transferred"],"url":"https://www.debian.org/security/2023/dsa-5530"},{"name":"GLSA-202310-18","tags":["vendor-advisory","x_transferred"],"url":"https://security.gentoo.org/glsa/202310-18"},{"url":"https://security.netapp.com/advisory/ntap-20231208-0011/","tags":["x_transferred"]}]}]}}