CVE-2021-41819

CGI::Cookie.parse in Ruby through 2.6.8 mishandles security prefixes in cookie names. This also affects the CGI gem through 0.3.0 for Ruby.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.5 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
mitreCNA
---
---
CVEADP
---
---
CISA-ADPADP
7.5 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Base Score
CVSS 3.x
EPSS Score
Percentile: 63%
VendorProductVersion
ruby-langcgi
0.1.0
ruby-langcgi
0.2.0
ruby-langcgi
0.3.0
ruby-langruby
𝑥
≤ 2.6.8
ruby-langruby
2.7.0 ≤
𝑥
< 2.7.5
ruby-langruby
3.0.0 ≤
𝑥
< 3.0.3
redhatsoftware_collections
-
redhatenterprise_linux
8.0
debiandebian_linux
9.0
debiandebian_linux
10.0
debiandebian_linux
11.0
suselinux_enterprise
11.0:sp1
suselinux_enterprise
12.0
suselinux_enterprise
15.0
opensusefactory
-
opensuseleap
15.2
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
ruby2.7
bullseye
2.7.4-1+deb11u1
fixed
bullseye (security)
2.7.4-1+deb11u2
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
ruby2.3
xenial
Fixed 2.3.1-2~ubuntu16.04.16+esm2
released
trusty
ignored
ruby2.5
bionic
Fixed 2.5.1-1ubuntu1.11
released
xenial
ignored
trusty
ignored
ruby2.7
impish
Fixed 2.7.4-1ubuntu3.1
released
hirsute
Fixed 2.7.2-4ubuntu1.3
released
focal
Fixed 2.7.0-5ubuntu1.6
released
xenial
ignored
trusty
ignored
ruby3.0
jammy
Fixed 3.0.2-7ubuntu2
released
xenial
ignored
trusty
ignored