Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      This week in AI dev tools: Slack’s enterprise search, Claude Code’s analytics dashboard, and more (July 18, 2025)

      July 18, 2025

      Report: 71% of tech leaders won’t hire devs without AI skills

      July 17, 2025

      Slack’s AI search now works across an organization’s entire knowledge base

      July 17, 2025

      In-House vs Outsourcing for React.js Development: Understand What Is Best for Your Enterprise

      July 17, 2025

      Elon Musk teasing a Grok male companion inspired by “50 Shades of Grey” — beating Microsoft’s AI CEO at his own game

      July 18, 2025

      My favorite RTS castle builder from 2002 just got a brilliant remaster — and it’s only $16 on PC for a limited time

      July 18, 2025

      Razer Core X V2 vs. Razer Core X V1 — There’s only one eGPU you want in 2025

      July 18, 2025

      4 features on Windows 11 exclusive to Europe that Microsoft should make global

      July 18, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      The details of TC39’s last meeting

      July 18, 2025
      Recent

      The details of TC39’s last meeting

      July 18, 2025

      Conditional Collection Skipping with Laravel’s skipWhile Method

      July 18, 2025

      Deploying Laravel Applications on Laravel Cloud With MongoDB Atlas

      July 18, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Elon Musk teasing a Grok male companion inspired by “50 Shades of Grey” — beating Microsoft’s AI CEO at his own game

      July 18, 2025
      Recent

      Elon Musk teasing a Grok male companion inspired by “50 Shades of Grey” — beating Microsoft’s AI CEO at his own game

      July 18, 2025

      My favorite RTS castle builder from 2002 just got a brilliant remaster — and it’s only $16 on PC for a limited time

      July 18, 2025

      Razer Core X V2 vs. Razer Core X V1 — There’s only one eGPU you want in 2025

      July 18, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Security»Common Vulnerabilities and Exposures (CVEs)»CVE-2025-54064 – Rucio Apache Access Log Credentials Exposure

    CVE-2025-54064 – Rucio Apache Access Log Credentials Exposure

    July 17, 2025

    CVE ID : CVE-2025-54064

    Published : July 17, 2025, 3:15 p.m. | 3 hours, 21 minutes ago

    Description : Rucio is a software framework that provides functionality to organize, manage, and access large volumes of scientific data using customizable policies. The common Rucio helm-charts for the `rucio-server`, `rucio-ui`, and `rucio-webui` define the log format for the apache access log of these components. The `X-Rucio-Auth-Token`, which is part of each request header sent to Rucio, is part of this log format. Thus, each access log line potentially exposes the credentials (Internal Rucio token, or JWT in case of OIDC authentication) of the user. Due to the length of the token (Especially for a JWT) the tokens are often truncated, and thus not usable as credential; nevertheless, the (partial) credential should not be part of the logfile. The impact of this issue is amplified if the access logs are made available to a larger group of people than the instance administrators themselves. An updated release has been supplied for the `rucio-server`, `rucio-ui` and `rucio-webui` helm-chart. The change was also retrofitted for the currently supported Rucio LTS releases. The patched versions are rucio-server 37.0.2, 35.0.1, and 32.0.1; rucio-ui 37.0.4, 35.0.1, and 32.0.2; and rucio-webui 37.0.2, 35.1.1, and 32.0.1. As a workaround, one may update the `logFormat` variable and remove the `X-Rucio-Auth-Token`.

    Severity: 0.0 | NA

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleCVE-2025-54066 – DiracX-Web Redirect Hijacking Vulnerability
    Next Article CVE-2025-54060 – WeGIA SQL Injection Vulnerability

    Related Posts

    Development

    Critical mcp-remote Vulnerability Enables Remote Code Execution, Impacting 437,000+ Downloads

    July 18, 2025
    Development

    CISA Adds Citrix NetScaler CVE-2025-5777 to KEV Catalog as Active Exploits Target Enterprises

    July 18, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    CVE-2025-23235 – OpenHarmony Out-of-Bounds Read Denial of Service

    Common Vulnerabilities and Exposures (CVEs)

    CVE-2024-47081 – Requests .netrc Credential Leakage Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    Transformers Gain Robust Multidimensional Positional Understanding: University of Manchester Researchers Introduce a Unified Lie Algebra Framework for N-Dimensional Rotary Position Embedding (RoPE)

    Machine Learning

    Windows 11 Build 22631.5696 rolls out to Beta channel with important fixes

    Operating Systems

    Highlights

    June 2025 Patch Tuesday: Microsoft Fixes 66 Bugs, Including Active 0-Day

    June 10, 2025

    June 2025 Patch Tuesday: Microsoft Fixes 66 Bugs, Including Active 0-Day

    Microsoft’s June Patch Tuesday update has landed, bringing security fixes for 66 vulnerabilities across its product line. Among the patched flaws is one that was already being exploited in real-world …
    Read more

    Published Date:
    Jun 10, 2025 (2 hours, 39 minutes ago)

    Vulnerabilities has been mentioned in this article.

    CVE-2025-33053

    CVE-2025-32706

    CVE-2025-32701

    CVE-2025-32756

    CVE-2025-29824

    Qilin Solidifies Claim as Top Ransomware Group

    July 1, 2025

    Crypto Developers Targeted by Python Malware Disguised as Coding Challenges

    April 15, 2025

    Qilin Ransomware Adds “Call Lawyer” Feature to Pressure Victims for Larger Ransoms

    June 20, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.