Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2021-22903

Опубликовано: 05 мая 2021
Источник: redhat
CVSS3: 6.5

Описание

The actionpack ruby gem before 6.1.3.2 suffers from a possible open redirect vulnerability. Specially crafted Host headers in combination with certain "allowed host" formats can cause the Host Authorization middleware in Action Pack to redirect users to a malicious website. This is similar to CVE-2021-22881. Strings in config.hosts that do not have a leading dot are converted to regular expressions without proper escaping. This causes, for example, config.hosts << "sub.example.com" to permit a request with a Host header value of sub-example.com.

A flaw was found in rubygem-actionpack. Specially crafted Host headers in combination with certain "allowed host" formats can cause the Host Authorization middleware in Action Pack to redirect users to a malicious website. The highest threat from this vulnerability is to data integrity.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
CloudForms Management Engine 5cfme-amazon-smartstateNot affected
CloudForms Management Engine 5cfme-gemsetNot affected
Red Hat Satellite 6tfm-ror52-rubygem-actionpackNot affected
Red Hat Satellite 6tfm-rubygem-actionpackNot affected

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-601
https://bugzilla.redhat.com/show_bug.cgi?id=1957438rubygem-actionpack: Possible Open Redirect Vulnerability in Action Pack

6.5 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.1
ubuntu
больше 4 лет назад

The actionpack ruby gem before 6.1.3.2 suffers from a possible open redirect vulnerability. Specially crafted Host headers in combination with certain "allowed host" formats can cause the Host Authorization middleware in Action Pack to redirect users to a malicious website. This is similar to CVE-2021-22881. Strings in config.hosts that do not have a leading dot are converted to regular expressions without proper escaping. This causes, for example, `config.hosts << "sub.example.com"` to permit a request with a Host header value of `sub-example.com`.

CVSS3: 6.1
nvd
больше 4 лет назад

The actionpack ruby gem before 6.1.3.2 suffers from a possible open redirect vulnerability. Specially crafted Host headers in combination with certain "allowed host" formats can cause the Host Authorization middleware in Action Pack to redirect users to a malicious website. This is similar to CVE-2021-22881. Strings in config.hosts that do not have a leading dot are converted to regular expressions without proper escaping. This causes, for example, `config.hosts << "sub.example.com"` to permit a request with a Host header value of `sub-example.com`.

CVSS3: 6.1
debian
больше 4 лет назад

The actionpack ruby gem before 6.1.3.2 suffers from a possible open re ...

CVSS3: 6.1
github
почти 5 лет назад

Possible Open Redirect Vulnerability in Action Pack

CVSS3: 6.1
fstec
почти 5 лет назад

Уязвимость промежуточного ПО Host Authorization фреймворка actionpack ruby gem программной платформы Ruby on Rails, связанная с недостаточной проверкой входных данных, позволяющая нарушителю получить доступ к конфиденциальным данным и нарушить их целостность

6.5 Medium

CVSS3