Vulnerability Name: | CVE-2021-22903 (CCN-201282) | ||||||||||||
Assigned: | 2021-05-05 | ||||||||||||
Published: | 2021-05-05 | ||||||||||||
Updated: | 2021-10-21 | ||||||||||||
Summary: | The actionpack ruby gem before 6.1.3.2 suffers from a possible open redirect vulnerability. Specially crafted Host headers in combination with certain "allowed host" formats can cause the Host Authorization middleware in Action Pack to redirect users to a malicious website. This is similar to CVE-2021-22881. Strings in config.hosts that do not have a leading dot are converted to regular expressions without proper escaping. This causes, for example, `config.hosts << "sub.example.com"` to permit a request with a Host header value of `sub-example.com`. | ||||||||||||
CVSS v3 Severity: | 6.1 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N) 5.3 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N/E:U/RL:O/RC:C)
6.4 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N/E:U/RL:O/RC:C)
| ||||||||||||
CVSS v2 Severity: | 5.8 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:N)
| ||||||||||||
Vulnerability Type: | CWE-601 | ||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2021-22903 Source: MISC Type: Mitigation, Patch, Vendor Advisory https://discuss.rubyonrails.org/t/cve-2021-22903-possible-open-redirect-vulnerability-in-action-pack/77867 Source: XF Type: UNKNOWN rubyonrails-cve202122903-open-redirect(201282) Source: MISC Type: Permissions Required, Third Party Advisory https://hackerone.com/reports/1148025 Source: CCN Type: Ruby on Rails Web site Ruby on Rails Source: CCN Type: oss-sec Mailing List, Wed, 5 May 2021 09:38:05 -0700 [CVE-2021-22903] Possible Open Redirect Vulnerability in Action Pack | ||||||||||||
Vulnerable Configuration: | Configuration 1:![]() | ||||||||||||
BACK |