Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-8877-prq4-9xfw

Опубликовано: 02 мар. 2021
Источник: github
Github: Прошло ревью
CVSS3: 6.1

Описание

Actionpack Open Redirect Vulnerability

The Host Authorization middleware in Action Pack before 6.1.2.1, 6.0.3.5 suffers from an open redirect vulnerability. Specially crafted Host headers in combination with certain "allowed host" formats can cause the Host Authorization middleware in Action Pack to redirect users to a malicious website.

Пакеты

Наименование

actionpack

rubygems
Затронутые версииВерсия исправления

>= 6.0.0, <= 6.0.3.4

6.0.3.5

Наименование

actionpack

rubygems
Затронутые версииВерсия исправления

>= 6.1.0, <= 6.1.2.0

6.1.2.1

EPSS

Процентиль: 93%
0.11507
Средний

6.1 Medium

CVSS3

Дефекты

CWE-601

Связанные уязвимости

CVSS3: 6.1
ubuntu
почти 5 лет назад

The Host Authorization middleware in Action Pack before 6.1.2.1, 6.0.3.5 suffers from an open redirect vulnerability. Specially crafted `Host` headers in combination with certain "allowed host" formats can cause the Host Authorization middleware in Action Pack to redirect users to a malicious website. Impacted applications will have allowed hosts with a leading dot. When an allowed host contains a leading dot, a specially crafted `Host` header can be used to redirect to a malicious website.

CVSS3: 6.1
redhat
почти 5 лет назад

The Host Authorization middleware in Action Pack before 6.1.2.1, 6.0.3.5 suffers from an open redirect vulnerability. Specially crafted `Host` headers in combination with certain "allowed host" formats can cause the Host Authorization middleware in Action Pack to redirect users to a malicious website. Impacted applications will have allowed hosts with a leading dot. When an allowed host contains a leading dot, a specially crafted `Host` header can be used to redirect to a malicious website.

CVSS3: 6.1
nvd
почти 5 лет назад

The Host Authorization middleware in Action Pack before 6.1.2.1, 6.0.3.5 suffers from an open redirect vulnerability. Specially crafted `Host` headers in combination with certain "allowed host" formats can cause the Host Authorization middleware in Action Pack to redirect users to a malicious website. Impacted applications will have allowed hosts with a leading dot. When an allowed host contains a leading dot, a specially crafted `Host` header can be used to redirect to a malicious website.

CVSS3: 6.1
debian
почти 5 лет назад

The Host Authorization middleware in Action Pack before 6.1.2.1, 6.0.3 ...

EPSS

Процентиль: 93%
0.11507
Средний

6.1 Medium

CVSS3

Дефекты

CWE-601