CVE-2021-22903
11.06.2021, 16:15
The actionpack ruby gem before 6.1.3.2 suffers from a possible open redirect vulnerability. Specially crafted Host headers in combination with certain "allowed host" formats can cause the Host Authorization middleware in Action Pack to redirect users to a malicious website. This is similar to CVE-2021-22881. Strings in config.hosts that do not have a leading dot are converted to regular expressions without proper escaping. This causes, for example, `config.hosts << "sub.example.com"` to permit a request with a Host header value of `sub-example.com`.
| Vendor | Product | Version |
|---|---|---|
| rubyonrails | rails | 6.1.1 ≤ 𝑥 < 6.1.3.2 |
| rubyonrails | rails | 6.1.0:rc2 |
𝑥
= Vulnerable software versions
Debian Releases
Ubuntu Releases
Ubuntu Product | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| rails |
| ||||||||||||||||||||||||
| rails-4.0 |
| ||||||||||||||||||||||||
| ruby-actionpack-3.2 |
| ||||||||||||||||||||||||
| ruby-activemodel-3.2 |
| ||||||||||||||||||||||||
| ruby-activerecord-3.2 |
| ||||||||||||||||||||||||
| ruby-activesupport-3.2 |
| ||||||||||||||||||||||||
| ruby-rails-3.2 |
|
Common Weakness Enumeration