Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2021-44528

Опубликовано: 14 дек. 2021
Источник: redhat
CVSS3: 5.4
EPSS Средний

Описание

A open redirect vulnerability exists in Action Pack >= 6.0.0 that could allow an attacker to craft a "X-Forwarded-Host" headers in combination with certain "allowed host" formats can cause the Host Authorization middleware in Action Pack to redirect users to a malicious website.

Отчет

Red Hat Satellite does not make use of the config.hosts setting and is not affected by this CVE.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Satellite 6tfm-rubygem-actionpackNot affected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-601
https://bugzilla.redhat.com/show_bug.cgi?id=2034266rubygem-actionpack: specially crafted "X-Forwarded-Host" headers may lead to open redirect

EPSS

Процентиль: 96%
0.26792
Средний

5.4 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.1
ubuntu
больше 3 лет назад

A open redirect vulnerability exists in Action Pack >= 6.0.0 that could allow an attacker to craft a "X-Forwarded-Host" headers in combination with certain "allowed host" formats can cause the Host Authorization middleware in Action Pack to redirect users to a malicious website.

CVSS3: 6.1
nvd
больше 3 лет назад

A open redirect vulnerability exists in Action Pack >= 6.0.0 that could allow an attacker to craft a "X-Forwarded-Host" headers in combination with certain "allowed host" formats can cause the Host Authorization middleware in Action Pack to redirect users to a malicious website.

CVSS3: 6.1
debian
больше 3 лет назад

A open redirect vulnerability exists in Action Pack >= 6.0.0 that coul ...

CVSS3: 6.1
redos
10 месяцев назад

Уязвимость rubygem-actionpack

CVSS3: 6.1
github
больше 3 лет назад

actionpack Open Redirect in Host Authorization Middleware

EPSS

Процентиль: 96%
0.26792
Средний

5.4 Medium

CVSS3