Vulnerability Name:

CVE-2021-41819 (CCN-216628)

Assigned:2021-11-24
Published:2021-11-24
Updated:2022-09-10
Summary:CGI::Cookie.parse in Ruby through 2.6.8 mishandles security prefixes in cookie names. This also affects the CGI gem through 0.3.0 for Ruby.
CVSS v3 Severity:7.5 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N)
6.5 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): High
Availibility (A): None
6.5 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N)
5.7 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): None
7.5 High (REDHAT CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N)
6.5 Medium (REDHAT Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): High
Availibility (A): None
CVSS v2 Severity:5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): None
6.4 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:N)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): None
Vulnerability Type:CWE-565
Vulnerability Consequences:Gain Access
References:Source: MITRE
Type: CNA
CVE-2021-41819

Source: XF
Type: UNKNOWN
rubygems-cve202141819-spoofing(216628)

Source: MISC
Type: Permissions Required, Third Party Advisory
https://hackerone.com/reports/910552

Source: FEDORA
Type: Mailing List, Third Party Advisory
FEDORA-2022-82a9edac27

Source: FEDORA
Type: Mailing List, Third Party Advisory
FEDORA-2022-8cf0124add

Source: CONFIRM
Type: Third Party Advisory
https://security.netapp.com/advisory/ntap-20220121-0003/

Source: CCN
Type: Ruby Web site
CVE-2021-41819: Cookie Prefix Spoofing in CGI::Cookie.parse

Source: CONFIRM
Type: Exploit, Vendor Advisory
https://www.ruby-lang.org/en/news/2021/11/24/cookie-prefix-spoofing-in-cgi-cookie-parse-cve-2021-41819/

Vulnerable Configuration:Configuration 1:
  • cpe:/a:ruby-lang:ruby:*:*:*:*:*:*:*:* (Version >= 3.0.0 and < 3.0.3)
  • OR cpe:/a:ruby-lang:ruby:*:*:*:*:*:*:*:* (Version >= 2.7.0 and < 2.7.5)
  • OR cpe:/a:ruby-lang:cgi:0.3.0:*:*:*:*:ruby:*:*
  • OR cpe:/a:ruby-lang:cgi:0.2.0:*:*:*:*:ruby:*:*
  • OR cpe:/a:ruby-lang:cgi:0.1.0:*:*:*:*:ruby:*:*
  • OR cpe:/a:ruby-lang:ruby:*:*:*:*:*:*:*:* (Version <= 2.6.8)

  • Configuration 2:
  • cpe:/o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
  • OR cpe:/a:redhat:software_collections:-:*:*:*:*:*:*:*

  • Configuration 3:
  • cpe:/o:debian:debian_linux:9.0:*:*:*:*:*:*:*
  • OR cpe:/o:debian:debian_linux:10.0:*:*:*:*:*:*:*
  • OR cpe:/o:debian:debian_linux:11.0:*:*:*:*:*:*:*

  • Configuration 4:
  • cpe:/o:suse:linux_enterprise:12.0:*:*:*:*:*:*:*
  • OR cpe:/o:suse:linux_enterprise:15.0:*:*:*:*:*:*:*
  • OR cpe:/o:suse:linux_enterprise:11.0:sp1:*:*:*:*:*:*

  • Configuration 5:
  • cpe:/a:opensuse:factory:-:*:*:*:*:*:*:*
  • OR cpe:/o:opensuse:leap:15.2:*:*:*:*:*:*:*

  • Configuration 6:
  • cpe:/o:fedoraproject:fedora:34:*:*:*:*:*:*:*
  • OR cpe:/o:fedoraproject:fedora:35:*:*:*:*:*:*:*

  • Configuration RedHat 1:
  • cpe:/a:redhat:enterprise_linux:8:*:*:*:*:*:*:*

  • Configuration RedHat 2:
  • cpe:/a:redhat:enterprise_linux:8::appstream:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:7660
    P
    libruby2_5-2_5-2.5.9-150000.4.26.1 on GA media (Moderate)
    2023-06-12
    oval:org.opensuse.security:def:763
    P
    Security update for ruby2.5 (Moderate)
    2022-09-16
    oval:com.redhat.rhsa:def:20226447
    P
    RHSA-2022:6447: ruby:2.7 security, bug fix, and enhancement update (Moderate)
    2022-09-13
    oval:com.redhat.rhsa:def:20226450
    P
    RHSA-2022:6450: ruby:3.0 security, bug fix, and enhancement update (Moderate)
    2022-09-13
    oval:com.redhat.rhsa:def:20225779
    P
    RHSA-2022:5779: ruby:2.5 security update (Moderate)
    2022-08-01
    oval:com.redhat.rhsa:def:20220543
    P
    RHSA-2022:0543: ruby:2.6 security update (Important)
    2022-02-16
    oval:org.opensuse.security:def:112816
    P
    libruby2_7-2_7-2.7.5-1.1 on GA media (Moderate)
    2022-01-17
    oval:org.opensuse.security:def:112819
    P
    libruby3_0-3_0-3.0.3-1.1 on GA media (Moderate)
    2022-01-17
    BACK
    ruby-lang ruby *
    ruby-lang ruby *
    ruby-lang cgi 0.3.0
    ruby-lang cgi 0.2.0
    ruby-lang cgi 0.1.0
    ruby-lang ruby *
    redhat enterprise linux 8.0
    redhat software collections -
    debian debian linux 9.0
    debian debian linux 10.0
    debian debian linux 11.0
    suse linux enterprise 12.0
    suse linux enterprise 15.0
    suse linux enterprise 11.0 sp1
    opensuse factory -
    opensuse leap 15.2
    fedoraproject fedora 34
    fedoraproject fedora 35