CVE-2021-22881
11.02.2021, 18:15
The Host Authorization middleware in Action Pack before 6.1.2.1, 6.0.3.5 suffers from an open redirect vulnerability. Specially crafted `Host` headers in combination with certain "allowed host" formats can cause the Host Authorization middleware in Action Pack to redirect users to a malicious website. Impacted applications will have allowed hosts with a leading dot. When an allowed host contains a leading dot, a specially crafted `Host` header can be used to redirect to a malicious website.
| Vendor | Product | Version |
|---|---|---|
| rubyonrails | rails | 6.0.0 ≤ 𝑥 < 6.0.3.5 |
| rubyonrails | rails | 6.1.0 ≤ 𝑥 < 6.1.2.1 |
𝑥
= Vulnerable software versions
Debian Releases
Ubuntu Releases
Ubuntu Product | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| rails |
| ||||||||||||||||||||||||
| rails-4.0 |
| ||||||||||||||||||||||||
| ruby-actionpack-3.2 |
| ||||||||||||||||||||||||
| ruby-activemodel-3.2 |
| ||||||||||||||||||||||||
| ruby-activerecord-3.2 |
| ||||||||||||||||||||||||
| ruby-activesupport-3.2 |
| ||||||||||||||||||||||||
| ruby-rails-3.2 |
|
Common Weakness Enumeration