Cherokee Terminal Escape Sequence in Logs Command Injection Vulnerability

Summary
Cherokee is prone to a command-injection vulnerability because it fails to adequately sanitize user-supplied input in logfiles. Attackers can exploit this issue to execute arbitrary commands in a terminal. Cherokee 0.99.30 and prior are vulnerable.
Solution
Updates are available. Please see the references for details.
References