Логотип exploitDog
bind:CVE-2021-22903
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2021-22903

Количество 6

Количество 6

ubuntu логотип

CVE-2021-22903

больше 4 лет назад

The actionpack ruby gem before 6.1.3.2 suffers from a possible open redirect vulnerability. Specially crafted Host headers in combination with certain "allowed host" formats can cause the Host Authorization middleware in Action Pack to redirect users to a malicious website. This is similar to CVE-2021-22881. Strings in config.hosts that do not have a leading dot are converted to regular expressions without proper escaping. This causes, for example, `config.hosts << "sub.example.com"` to permit a request with a Host header value of `sub-example.com`.

CVSS3: 6.1
EPSS: Низкий
redhat логотип

CVE-2021-22903

почти 5 лет назад

The actionpack ruby gem before 6.1.3.2 suffers from a possible open redirect vulnerability. Specially crafted Host headers in combination with certain "allowed host" formats can cause the Host Authorization middleware in Action Pack to redirect users to a malicious website. This is similar to CVE-2021-22881. Strings in config.hosts that do not have a leading dot are converted to regular expressions without proper escaping. This causes, for example, `config.hosts << "sub.example.com"` to permit a request with a Host header value of `sub-example.com`.

CVSS3: 6.5
EPSS: Низкий
nvd логотип

CVE-2021-22903

больше 4 лет назад

The actionpack ruby gem before 6.1.3.2 suffers from a possible open redirect vulnerability. Specially crafted Host headers in combination with certain "allowed host" formats can cause the Host Authorization middleware in Action Pack to redirect users to a malicious website. This is similar to CVE-2021-22881. Strings in config.hosts that do not have a leading dot are converted to regular expressions without proper escaping. This causes, for example, `config.hosts << "sub.example.com"` to permit a request with a Host header value of `sub-example.com`.

CVSS3: 6.1
EPSS: Низкий
debian логотип

CVE-2021-22903

больше 4 лет назад

The actionpack ruby gem before 6.1.3.2 suffers from a possible open re ...

CVSS3: 6.1
EPSS: Низкий
github логотип

GHSA-5hq2-xf89-9jxq

почти 5 лет назад

Possible Open Redirect Vulnerability in Action Pack

CVSS3: 6.1
EPSS: Низкий
fstec логотип

BDU:2021-04602

почти 5 лет назад

Уязвимость промежуточного ПО Host Authorization фреймворка actionpack ruby gem программной платформы Ruby on Rails, связанная с недостаточной проверкой входных данных, позволяющая нарушителю получить доступ к конфиденциальным данным и нарушить их целостность

CVSS3: 6.1
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2021-22903

The actionpack ruby gem before 6.1.3.2 suffers from a possible open redirect vulnerability. Specially crafted Host headers in combination with certain "allowed host" formats can cause the Host Authorization middleware in Action Pack to redirect users to a malicious website. This is similar to CVE-2021-22881. Strings in config.hosts that do not have a leading dot are converted to regular expressions without proper escaping. This causes, for example, `config.hosts << "sub.example.com"` to permit a request with a Host header value of `sub-example.com`.

CVSS3: 6.1
0%
Низкий
больше 4 лет назад
redhat логотип
CVE-2021-22903

The actionpack ruby gem before 6.1.3.2 suffers from a possible open redirect vulnerability. Specially crafted Host headers in combination with certain "allowed host" formats can cause the Host Authorization middleware in Action Pack to redirect users to a malicious website. This is similar to CVE-2021-22881. Strings in config.hosts that do not have a leading dot are converted to regular expressions without proper escaping. This causes, for example, `config.hosts << "sub.example.com"` to permit a request with a Host header value of `sub-example.com`.

CVSS3: 6.5
0%
Низкий
почти 5 лет назад
nvd логотип
CVE-2021-22903

The actionpack ruby gem before 6.1.3.2 suffers from a possible open redirect vulnerability. Specially crafted Host headers in combination with certain "allowed host" formats can cause the Host Authorization middleware in Action Pack to redirect users to a malicious website. This is similar to CVE-2021-22881. Strings in config.hosts that do not have a leading dot are converted to regular expressions without proper escaping. This causes, for example, `config.hosts << "sub.example.com"` to permit a request with a Host header value of `sub-example.com`.

CVSS3: 6.1
0%
Низкий
больше 4 лет назад
debian логотип
CVE-2021-22903

The actionpack ruby gem before 6.1.3.2 suffers from a possible open re ...

CVSS3: 6.1
0%
Низкий
больше 4 лет назад
github логотип
GHSA-5hq2-xf89-9jxq

Possible Open Redirect Vulnerability in Action Pack

CVSS3: 6.1
0%
Низкий
почти 5 лет назад
fstec логотип
BDU:2021-04602

Уязвимость промежуточного ПО Host Authorization фреймворка actionpack ruby gem программной платформы Ruby on Rails, связанная с недостаточной проверкой входных данных, позволяющая нарушителю получить доступ к конфиденциальным данным и нарушить их целостность

CVSS3: 6.1
0%
Низкий
почти 5 лет назад

Уязвимостей на страницу