Skip to content

Commit 43bebb0

Browse files
1 parent c3ae0f1 commit 43bebb0

File tree

2 files changed

+217
-0
lines changed

2 files changed

+217
-0
lines changed
Lines changed: 151 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,151 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-227x-7mh8-3cf6",
4+
"modified": "2025-09-25T16:39:16Z",
5+
"published": "2025-09-25T16:39:16Z",
6+
"aliases": [
7+
"CVE-2025-59823"
8+
],
9+
"summary": "Gardener Extensions for multiple providers vulnerable to Terraform code injection",
10+
"details": "### Impact\n\nA security vulnerability was discovered in Gardener when [Terraformer](https://github.com/gardener/terraformer) is used for infrastructure provisioning. This vulnerability could allow a user with administrative privileges for a Gardener project to obtain control over the seed cluster where the shoot cluster is managed.\n\nThis CVE affects all Gardener installations where [Terraformer](https://github.com/gardener/terraformer) is used/can be enabled for infrastructure provisioning with any of the affected components mentioned below.\n\n### Affected Components\n• gardener-extension-provider-gcp\n• gardener-extension-provider-azure\n• gardener-extension-provider-openstack\n• gardener-extension-provider-aws\n\n### Affected Versions\n• gardener-extension-provider-gcp < v1.46.0\n• gardener-extension-provider-azure < v1.55.0\n• gardener-extension-provider-openstack < v1.49.0\n• gardener-extension-provider-aws < v1.64.0\n\n### Fixed versions\n• gardener-extension-provider-gcp >= v1.46.0\n• gardener-extension-provider-azure >= v1.55.0\n• gardener-extension-provider-openstack >= v1.49.0\n• gardener-extension-provider-aws >= v1.64.0\n\n### How do I mitigate this vulnerability?\nUpdate to a fixed version.",
11+
"severity": [
12+
{
13+
"type": "CVSS_V3",
14+
"score": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"
15+
}
16+
],
17+
"affected": [
18+
{
19+
"package": {
20+
"ecosystem": "Go",
21+
"name": "github.com/gardener/gardener-extension-provider-aws"
22+
},
23+
"ranges": [
24+
{
25+
"type": "ECOSYSTEM",
26+
"events": [
27+
{
28+
"introduced": "0"
29+
},
30+
{
31+
"fixed": "1.64.0"
32+
}
33+
]
34+
}
35+
]
36+
},
37+
{
38+
"package": {
39+
"ecosystem": "Go",
40+
"name": "github.com/gardener/gardener-extension-provider-gcp"
41+
},
42+
"ranges": [
43+
{
44+
"type": "ECOSYSTEM",
45+
"events": [
46+
{
47+
"introduced": "0"
48+
},
49+
{
50+
"fixed": "1.46.0"
51+
}
52+
]
53+
}
54+
]
55+
},
56+
{
57+
"package": {
58+
"ecosystem": "Go",
59+
"name": "github.com/gardener/gardener-extension-provider-azure"
60+
},
61+
"ranges": [
62+
{
63+
"type": "ECOSYSTEM",
64+
"events": [
65+
{
66+
"introduced": "0"
67+
},
68+
{
69+
"fixed": "1.55.0"
70+
}
71+
]
72+
}
73+
]
74+
},
75+
{
76+
"package": {
77+
"ecosystem": "Go",
78+
"name": "github.com/gardener/gardener-extension-provider-openstack"
79+
},
80+
"ranges": [
81+
{
82+
"type": "ECOSYSTEM",
83+
"events": [
84+
{
85+
"introduced": "0"
86+
},
87+
{
88+
"fixed": "1.49.0"
89+
}
90+
]
91+
}
92+
]
93+
}
94+
],
95+
"references": [
96+
{
97+
"type": "WEB",
98+
"url": "https://github.com/gardener/gardener-extension-provider-aws/security/advisories/GHSA-227x-7mh8-3cf6"
99+
},
100+
{
101+
"type": "ADVISORY",
102+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-59823"
103+
},
104+
{
105+
"type": "WEB",
106+
"url": "https://github.com/gardener/gardener-extension-provider-aws/commit/cb5045fc146248296994804bbfe27bd896938bf2"
107+
},
108+
{
109+
"type": "WEB",
110+
"url": "https://github.com/gardener/gardener-extension-provider-azure/commit/4573a4404969f89781ed6cf72e90554bc6ae2020"
111+
},
112+
{
113+
"type": "WEB",
114+
"url": "https://github.com/gardener/gardener-extension-provider-gcp/commit/51111b4f60c33c60dfdf18b1fc50f7ec8d8f70ac"
115+
},
116+
{
117+
"type": "WEB",
118+
"url": "https://github.com/gardener/gardener-extension-provider-openstack/commit/2ed6f0fe1be90fbef5d6093eb0b8325c8421b8d8"
119+
},
120+
{
121+
"type": "PACKAGE",
122+
"url": "https://github.com/gardener/gardener-extension-provider-aws"
123+
},
124+
{
125+
"type": "WEB",
126+
"url": "https://github.com/gardener/gardener-extension-provider-aws/releases/tag/v1.64.0"
127+
},
128+
{
129+
"type": "WEB",
130+
"url": "https://github.com/gardener/gardener-extension-provider-azure/releases/tag/v1.55.0"
131+
},
132+
{
133+
"type": "WEB",
134+
"url": "https://github.com/gardener/gardener-extension-provider-gcp/releases/tag/v1.46.0"
135+
},
136+
{
137+
"type": "WEB",
138+
"url": "https://github.com/gardener/gardener-extension-provider-openstack/releases/tag/v1.49.0"
139+
}
140+
],
141+
"database_specific": {
142+
"cwe_ids": [
143+
"CWE-20",
144+
"CWE-94"
145+
],
146+
"severity": "CRITICAL",
147+
"github_reviewed": true,
148+
"github_reviewed_at": "2025-09-25T16:39:16Z",
149+
"nvd_published_at": "2025-09-25T15:16:13Z"
150+
}
151+
}
Lines changed: 66 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,66 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-625h-95r8-8xpm",
4+
"modified": "2025-09-25T16:39:27Z",
5+
"published": "2025-09-25T16:39:27Z",
6+
"aliases": [
7+
"CVE-2025-59830"
8+
],
9+
"summary": "Rack has an unsafe default in Rack::QueryParser allows params_limit bypass via semicolon-separated parameters",
10+
"details": "## Summary\n\n`Rack::QueryParser` in version `< 2.2.18` enforces its `params_limit` only for parameters separated by `&`, while still splitting on both `&` and `;`. As a result, attackers could use `;` separators to bypass the parameter count limit and submit more parameters than intended.\n\n## Details\n\nThe issue arises because `Rack::QueryParser#check_query_string` counts only `&` characters when determining the number of parameters, but the default separator regex `DEFAULT_SEP = /[&;] */n` splits on both `&` and `;`. This mismatch means that queries using `;` separators were not included in the parameter count, allowing `params_limit` to be bypassed.\n\nOther safeguards (`bytesize_limit` and `key_space_limit`) still applied, but did not prevent this particular bypass.\n\n## Impact\n\nApplications or middleware that directly invoke `Rack::QueryParser` with its default configuration (no explicit delimiter) could be exposed to increased CPU and memory consumption. This can be abused as a limited denial-of-service vector.\n\n`Rack::Request`, the primary entry point for typical Rack applications, uses `QueryParser` in a safe way and does not appear vulnerable by default. As such, the severity is considered **low**, with the impact limited to edge cases where `QueryParser` is used directly.\n\n## Mitigation\n\n* Upgrade to a patched version of Rack where both `&` and `;` are counted consistently toward `params_limit`.\n* If upgrading is not immediately possible, configure `QueryParser` with an explicit delimiter (e.g., `&`) to avoid the mismatch.\n* As a general precaution, enforce query string and request size limits at the web server or proxy layer (e.g., Nginx, Apache, or a CDN) to mitigate excessive parsing overhead.",
11+
"severity": [
12+
{
13+
"type": "CVSS_V3",
14+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
15+
}
16+
],
17+
"affected": [
18+
{
19+
"package": {
20+
"ecosystem": "RubyGems",
21+
"name": "rack"
22+
},
23+
"ranges": [
24+
{
25+
"type": "ECOSYSTEM",
26+
"events": [
27+
{
28+
"introduced": "0"
29+
},
30+
{
31+
"fixed": "2.2.18"
32+
}
33+
]
34+
}
35+
]
36+
}
37+
],
38+
"references": [
39+
{
40+
"type": "WEB",
41+
"url": "https://github.com/rack/rack/security/advisories/GHSA-625h-95r8-8xpm"
42+
},
43+
{
44+
"type": "ADVISORY",
45+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-59830"
46+
},
47+
{
48+
"type": "WEB",
49+
"url": "https://github.com/rack/rack/commit/54e4ffdd5affebcb0c015cc6ae74635c0831ed71"
50+
},
51+
{
52+
"type": "PACKAGE",
53+
"url": "https://github.com/rack/rack"
54+
}
55+
],
56+
"database_specific": {
57+
"cwe_ids": [
58+
"CWE-400",
59+
"CWE-770"
60+
],
61+
"severity": "HIGH",
62+
"github_reviewed": true,
63+
"github_reviewed_at": "2025-09-25T16:39:27Z",
64+
"nvd_published_at": "2025-09-25T15:16:13Z"
65+
}
66+
}

0 commit comments

Comments
 (0)