CVE-2025-27610: Local file inclusion
After collecting a fair number of CVEs, I realized that having a CVE isnât really that big of a dealâunless itâs a major one (or comes with a juicy bug bounty đ). So I figured, why not challenge myself with a CVE thatâs not from a giant like Microsoft or Google, but still big enough to push my limits a bit? Thatâs when I started hunting for a target with a few friends, just for fun. Then I thoughtâwhy not go for something a little off the beaten path?
Thatâs how I ended up looking into languages I hadnât really touched much before, like Ruby, Rust, and Go. After some digging, I stumbled upon Rackâa Ruby interface that connects web servers with Ruby web applications.
Detail Analysis
The full technical breakdown of this CVE has already been published on the companyâs official blog: OPSWAT Blog - Security Analysis of Rack Ruby Framework CVEs. So in this post, I just want to share the journey of how I found the bug.
Why I choose Rack?â
Partly to challenge myself, and partly for the reasons I mentioned earlier (yes, the money too đ
). Like any other researcher, I started by learning about the thing I wanted to audit. I dug into the docs and source code to understand what Rack actually does. Since itâs written in Ruby, reading and bug hunting was a bit tougher than usual (Iâm more used to Python and JavaScript, lol).
After spending some time on it, I eventually found a bug. I submitted it right away and ended up getting a bounty for it. That gave me a nice boost of motivation to keep going and aim for even bigger bugs next time. đ
My bug in News
- https://cybernews.com/security/ruby-rack-static-vulnerability-path-traversal-security-risk/
- https://thehackernews.com/2025/04/researchers-identify-rackstatic.html
- https://www.helpnetsecurity.com/2025/04/25/rack-ruby-vulnerability-could-reveal-secrets-to-attackers-cve-2025-27610/
- https://insight.scmagazineuk.com/vulnerabilities-in-ruby-rack-could-allow-unauthorised-file-access