CVE-2021-33621
18.11.2022, 23:15
The cgi gem before 0.1.0.2, 0.2.x before 0.2.2, and 0.3.x before 0.3.5 for Ruby allows HTTP response splitting. This is relevant to applications that use untrusted user input either to generate an HTTP response or to create a CGI::Cookie object.
Vendor | Product | Version |
---|---|---|
ruby-lang | cgi | 𝑥 < 0.1.0.2 |
ruby-lang | cgi | 0.2.0 ≤ 𝑥 < 0.2.2 |
ruby-lang | cgi | 0.3.0 ≤ 𝑥 < 0.3.5 |
ruby-lang | ruby | 2.7.0 ≤ 𝑥 < 2.7.7 |
ruby-lang | ruby | 3.0.0 ≤ 𝑥 < 3.0.5 |
ruby-lang | ruby | 3.1.0 ≤ 𝑥 < 3.1.3 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Ubuntu Product | |||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
jruby |
| ||||||||||||||||||
ruby1.9.1 |
| ||||||||||||||||||
ruby2.0 |
| ||||||||||||||||||
ruby2.3 |
| ||||||||||||||||||
ruby2.5 |
| ||||||||||||||||||
ruby2.7 |
| ||||||||||||||||||
ruby3.0 |
| ||||||||||||||||||
ruby3.1 |
|
References