Close Menu
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Spanish
What's Hot

How a hardware wallet protects your private key: Security and safety instructions

Cartoonist Paul Pope is more worried about killer robots than AI plagiarism

Review Week: Meta reveals Oakley Smart Glasses

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Spanish
Fyself News
Home » Researchers identify static vulnerabilities that allow data breach in rack:: Ruby servers
Identity

Researchers identify static vulnerabilities that allow data breach in rack:: Ruby servers

userBy userApril 25, 2025No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

April 25, 2025Ravi LakshmananVulnerability/Data Breaches

Cybersecurity researchers have disclosed three security flaws in the Rack Ruby Web Server interface: This allows an attacker to gain unauthorized access to the file, inject malicious data, and allow logs to be tampered with certain conditions.

Vulnerabilities flagged by cybersecurity vendor opswat are listed below –

CVE-2025-27610 (CVSS score: 7.5) – Path traversal vulnerability that can be used to access all files under the specified root: directory, assuming that an attacker can determine the path to those files. Vulnerability that can be used to manipulate log entries and distort log files CVE-2025-25184 (CVSS score: 5.7) – Inappropriate neutralization (CRLF) sequences and inappropriate output of carriage return line feed (CRLF) sequences are neutralized, allowing log manipulation vulnerabilities and malicious data to manipulate log manipulation vulnerabilities.

The successful exploitation of flaws allows attackers to obscure traces of attacks, read any file and inject malicious code.

Cybersecurity

“Of these vulnerabilities, CVE-2025-27610 is particularly serious. This could lead to data breaches, as it allows uncertified attackers to obtain sensitive information such as configuration files, credentials, and sensitive data.

The drawback comes from the fact that Rack::Static, the middleware used to serve static content such as JavaScript, StyleSheet, and images, does not sanitize paths that users will suppress before serving files, leading to scenarios where attackers can provide specially created paths for accessing files other than static file directories.

“Specifically, if no root parameters are explicitly defined, the rack defaults this value to the current working directory by assigning a value of dir.pwd and implicitly specifies it as the web root directory of the rack application,” Opswat said.

As a result: if the route option is undefined or is misconfigured for the following options, an uncertified attacker can use CVE-2025-27610 through the PATH traversal technique to access sensitive files outside the intended web directory.

We recommend updating to the latest version to mitigate the risk poses from defects. If immediate patching is not an option, we recommend removing the use of rack::static or pointing to a directory path that contains only the files that should be exposed.

Serious flaws in Infodraw Media Relay Service

This disclosure is due to a serious security flaw that was unearthed in the Infodraw Media Relay Service (MRS), which allows the reading or deletion of any file via a past traversal vulnerability in the username parameter on the system’s login page (CVE-2025-43928, CVSS score: 9.8).

InfodRaw is an Israeli manufacturer of mobile video surveillance solutions used to transmit audio, video and GPS data over telecommunications networks. According to the company’s website, the device is used in many countries by law enforcement, private investigations, fleet management and public transport.

Cybersecurity

“A trivial past traversal vulnerability allows files to be read from systems aimed at unrecognized attackers,” security researcher Tim Phillip Shepherds said in a statement shared with Hacker News. “In addition, there is a “arbitrary file deletion vulnerability” that allows an attacker to delete files from the system. ”

The Flaw, which allows you to log in with a username such as “..//../..//” affects both the Windows and Linux versions of MRS. That said, the defects continue to remain below. The vulnerable systems in Belgium and Luxembourg have been taken offline following responsible disclosure.

“Affected organizations are primarily encouraged to take their applications offline immediately (although despite early warnings, manufacturer patches are not available, so it is believed that the vulnerability could be exploited by vulnerable actors in the near future),” Philip Shepherds said.

“If this is not possible, the system should further protect it with additional metering (such as using a VPN or unlocking a certain IP).”

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous Article3D satellite monitoring helps protect forests from climate change
Next Article Mouse Marketing in 2025: What’s changed, what’s still working, what’s worth dropping
user
  • Website

Related Posts

Spiders scattered behind M&S and cooperative cyberattacks, with up to $592 million in damages

June 21, 2025

Qilin ransomware adds “Cole Lawyer” feature that puts pressure on victims for larger ransoms

June 20, 2025

Television in Iranian states hijacked mid-distance broadcasts amid geopolitical tensions. $90 million stolen from Crypto Heist

June 20, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

How a hardware wallet protects your private key: Security and safety instructions

Cartoonist Paul Pope is more worried about killer robots than AI plagiarism

Review Week: Meta reveals Oakley Smart Glasses

Spiders scattered behind M&S and cooperative cyberattacks, with up to $592 million in damages

Trending Posts

Sana Yousaf, who was the Pakistani Tiktok star shot by gunmen? |Crime News

June 4, 2025

Trump says it’s difficult to make a deal with China’s xi’ amid trade disputes | Donald Trump News

June 4, 2025

Iraq’s Jewish Community Saves Forgotten Shrine Religious News

June 4, 2025

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

How a hardware wallet protects your private key: Security and safety instructions

Top Startups and High-Tech Funding News for the Weekly Ends June 20, 2025

Apple is talking to you to win AI startup confusion

Mira Murati’s AI Startup Thinking Machine Lab emerges from stealth at $20 billion seed and $1 billion valuation

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.