Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2021-22881 (GCVE-0-2021-22881)
Vulnerability from cvelistv5 – Published: 2021-02-11 16:12 – Updated: 2024-08-03 18:58
VLAI?
EPSS
Summary
The Host Authorization middleware in Action Pack before 6.1.2.1, 6.0.3.5 suffers from an open redirect vulnerability. Specially crafted `Host` headers in combination with certain "allowed host" formats can cause the Host Authorization middleware in Action Pack to redirect users to a malicious website. Impacted applications will have allowed hosts with a leading dot. When an allowed host contains a leading dot, a specially crafted `Host` header can be used to redirect to a malicious website.
Severity ?
No CVSS data available.
CWE
- CWE-601 - Open Redirect (CWE-601)
Assigner
References
| URL | Tags | ||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | https://github.com/rails/rails |
Affected:
Fixed in 6.1.2.1, 6.0.3.5
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T18:58:24.786Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://hackerone.com/reports/1047447"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://discuss.rubyonrails.org/t/cve-2021-22881-possible-open-redirect-in-host-authorization-middleware/77130"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://benjamin-bouchet.com/cve-2021-22881-faille-de-securite-dans-le-middleware-hostauthorization/"
},
{
"name": "FEDORA-2021-b571fca1b8",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XQ3NS4IBYE2I3MVMGAHFZBZBIZGHXHT3/"
},
{
"name": "[oss-security] 20210505 [CVE-2021-22903] Possible Open Redirect Vulnerability in Action Pack",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2021/05/05/2"
},
{
"name": "[oss-security] 20210819 [CVE-2021-22942] Possible Open Redirect in Host Authorization Middleware",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2021/08/20/1"
},
{
"name": "[oss-security] 20211214 [CVE-2021-44528] Possible Open Redirect in Host Authorization Middleware",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2021/12/14/5"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "https://github.com/rails/rails",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "Fixed in 6.1.2.1, 6.0.3.5"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "The Host Authorization middleware in Action Pack before 6.1.2.1, 6.0.3.5 suffers from an open redirect vulnerability. Specially crafted `Host` headers in combination with certain \"allowed host\" formats can cause the Host Authorization middleware in Action Pack to redirect users to a malicious website. Impacted applications will have allowed hosts with a leading dot. When an allowed host contains a leading dot, a specially crafted `Host` header can be used to redirect to a malicious website."
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-601",
"description": "Open Redirect (CWE-601)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-12-14T21:06:20",
"orgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1",
"shortName": "hackerone"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://hackerone.com/reports/1047447"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://discuss.rubyonrails.org/t/cve-2021-22881-possible-open-redirect-in-host-authorization-middleware/77130"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://benjamin-bouchet.com/cve-2021-22881-faille-de-securite-dans-le-middleware-hostauthorization/"
},
{
"name": "FEDORA-2021-b571fca1b8",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XQ3NS4IBYE2I3MVMGAHFZBZBIZGHXHT3/"
},
{
"name": "[oss-security] 20210505 [CVE-2021-22903] Possible Open Redirect Vulnerability in Action Pack",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://www.openwall.com/lists/oss-security/2021/05/05/2"
},
{
"name": "[oss-security] 20210819 [CVE-2021-22942] Possible Open Redirect in Host Authorization Middleware",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://www.openwall.com/lists/oss-security/2021/08/20/1"
},
{
"name": "[oss-security] 20211214 [CVE-2021-44528] Possible Open Redirect in Host Authorization Middleware",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://www.openwall.com/lists/oss-security/2021/12/14/5"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "support@hackerone.com",
"ID": "CVE-2021-22881",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "https://github.com/rails/rails",
"version": {
"version_data": [
{
"version_value": "Fixed in 6.1.2.1, 6.0.3.5"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The Host Authorization middleware in Action Pack before 6.1.2.1, 6.0.3.5 suffers from an open redirect vulnerability. Specially crafted `Host` headers in combination with certain \"allowed host\" formats can cause the Host Authorization middleware in Action Pack to redirect users to a malicious website. Impacted applications will have allowed hosts with a leading dot. When an allowed host contains a leading dot, a specially crafted `Host` header can be used to redirect to a malicious website."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Open Redirect (CWE-601)"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://hackerone.com/reports/1047447",
"refsource": "MISC",
"url": "https://hackerone.com/reports/1047447"
},
{
"name": "https://discuss.rubyonrails.org/t/cve-2021-22881-possible-open-redirect-in-host-authorization-middleware/77130",
"refsource": "MISC",
"url": "https://discuss.rubyonrails.org/t/cve-2021-22881-possible-open-redirect-in-host-authorization-middleware/77130"
},
{
"name": "https://benjamin-bouchet.com/cve-2021-22881-faille-de-securite-dans-le-middleware-hostauthorization/",
"refsource": "MISC",
"url": "https://benjamin-bouchet.com/cve-2021-22881-faille-de-securite-dans-le-middleware-hostauthorization/"
},
{
"name": "FEDORA-2021-b571fca1b8",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XQ3NS4IBYE2I3MVMGAHFZBZBIZGHXHT3/"
},
{
"name": "[oss-security] 20210505 [CVE-2021-22903] Possible Open Redirect Vulnerability in Action Pack",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2021/05/05/2"
},
{
"name": "[oss-security] 20210819 [CVE-2021-22942] Possible Open Redirect in Host Authorization Middleware",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2021/08/20/1"
},
{
"name": "[oss-security] 20211214 [CVE-2021-44528] Possible Open Redirect in Host Authorization Middleware",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2021/12/14/5"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1",
"assignerShortName": "hackerone",
"cveId": "CVE-2021-22881",
"datePublished": "2021-02-11T16:12:34",
"dateReserved": "2021-01-06T00:00:00",
"dateUpdated": "2024-08-03T18:58:24.786Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2021-22881\",\"sourceIdentifier\":\"support@hackerone.com\",\"published\":\"2021-02-11T18:15:17.460\",\"lastModified\":\"2024-11-21T05:50:49.740\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The Host Authorization middleware in Action Pack before 6.1.2.1, 6.0.3.5 suffers from an open redirect vulnerability. Specially crafted `Host` headers in combination with certain \\\"allowed host\\\" formats can cause the Host Authorization middleware in Action Pack to redirect users to a malicious website. Impacted applications will have allowed hosts with a leading dot. When an allowed host contains a leading dot, a specially crafted `Host` header can be used to redirect to a malicious website.\"},{\"lang\":\"es\",\"value\":\"El middleware de Autorizaci\u00f3n de Host en Action Pack versiones anteriores a 6.1.2.1, 6.0.3.5 sufre una vulnerabilidad de redireccionamiento abierto.\u0026#xa0;Los encabezados \\\"Host\\\" especialmente dise\u00f1ados en combinaci\u00f3n con determinados formatos \\\"allowed host\\\" pueden causar que el middleware de Autorizaci\u00f3n del Host en Action Pack redireccione a los usuarios a un sitio web malicioso.\u0026#xa0;Las aplicaciones afectadas habr\u00e1n permitido hosts con un punto inicial.\u0026#xa0;Cuando un host permitido contiene un punto inicial, un encabezado \\\"Host\\\" especialmente dise\u00f1ado puede ser usado para redireccionar hacia un sitio web malicioso\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N\",\"baseScore\":6.1,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.8,\"impactScore\":2.7}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:P/A:N\",\"baseScore\":5.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":4.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"support@hackerone.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-601\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-601\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.0.0\",\"versionEndExcluding\":\"6.0.3.5\",\"matchCriteriaId\":\"817BE0F5-136C-460E-816D-74B3F6663BA8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.1.0\",\"versionEndExcluding\":\"6.1.2.1\",\"matchCriteriaId\":\"98CE6993-089E-454B-8156-011E03FC3C94\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E460AA51-FCDA-46B9-AE97-E6676AA5E194\"}]}]}],\"references\":[{\"url\":\"http://www.openwall.com/lists/oss-security/2021/05/05/2\",\"source\":\"support@hackerone.com\",\"tags\":[\"Mailing List\",\"Mitigation\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2021/08/20/1\",\"source\":\"support@hackerone.com\",\"tags\":[\"Mailing List\",\"Mitigation\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2021/12/14/5\",\"source\":\"support@hackerone.com\",\"tags\":[\"Exploit\",\"Mailing List\",\"Patch\"]},{\"url\":\"https://benjamin-bouchet.com/cve-2021-22881-faille-de-securite-dans-le-middleware-hostauthorization/\",\"source\":\"support@hackerone.com\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://discuss.rubyonrails.org/t/cve-2021-22881-possible-open-redirect-in-host-authorization-middleware/77130\",\"source\":\"support@hackerone.com\",\"tags\":[\"Mitigation\",\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://hackerone.com/reports/1047447\",\"source\":\"support@hackerone.com\",\"tags\":[\"Exploit\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XQ3NS4IBYE2I3MVMGAHFZBZBIZGHXHT3/\",\"source\":\"support@hackerone.com\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2021/05/05/2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Mitigation\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2021/08/20/1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Mitigation\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2021/12/14/5\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Mailing List\",\"Patch\"]},{\"url\":\"https://benjamin-bouchet.com/cve-2021-22881-faille-de-securite-dans-le-middleware-hostauthorization/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://discuss.rubyonrails.org/t/cve-2021-22881-possible-open-redirect-in-host-authorization-middleware/77130\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mitigation\",\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://hackerone.com/reports/1047447\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XQ3NS4IBYE2I3MVMGAHFZBZBIZGHXHT3/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
}
}
OPENSUSE-SU-2024:11821-1
Vulnerability from csaf_opensuse - Published: 2024-06-15 00:00 - Updated: 2024-06-15 00:00Summary
ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1 on GA media
Notes
Title of the patch
ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1 on GA media
Description of the patch
These are all security issues fixed in the ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2024-11821
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-11821",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_11821-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-16782 page",
"url": "https://www.suse.com/security/cve/CVE-2019-16782/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5418 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5418/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-8164 page",
"url": "https://www.suse.com/security/cve/CVE-2020-8164/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-8166 page",
"url": "https://www.suse.com/security/cve/CVE-2020-8166/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-8185 page",
"url": "https://www.suse.com/security/cve/CVE-2020-8185/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-8264 page",
"url": "https://www.suse.com/security/cve/CVE-2020-8264/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-22881 page",
"url": "https://www.suse.com/security/cve/CVE-2021-22881/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-22885 page",
"url": "https://www.suse.com/security/cve/CVE-2021-22885/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-22902 page",
"url": "https://www.suse.com/security/cve/CVE-2021-22902/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-22904 page",
"url": "https://www.suse.com/security/cve/CVE-2021-22904/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-22942 page",
"url": "https://www.suse.com/security/cve/CVE-2021-22942/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-44528 page",
"url": "https://www.suse.com/security/cve/CVE-2021-44528/"
}
],
"title": "ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:11821-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.aarch64",
"product": {
"name": "ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.aarch64",
"product_id": "ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.ppc64le",
"product": {
"name": "ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.ppc64le",
"product_id": "ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.s390x",
"product": {
"name": "ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.s390x",
"product_id": "ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.x86_64",
"product": {
"name": "ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.x86_64",
"product_id": "ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.aarch64"
},
"product_reference": "ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.ppc64le"
},
"product_reference": "ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.s390x"
},
"product_reference": "ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.x86_64"
},
"product_reference": "ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-16782",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-16782"
}
],
"notes": [
{
"category": "general",
"text": "There\u0027s a possible information leak / session hijack vulnerability in Rack (RubyGem rack). This vulnerability is patched in versions 1.6.12 and 2.0.8. Attackers may be able to find and hijack sessions by using timing attacks targeting the session id. Session ids are usually stored and indexed in a database that uses some kind of scheme for speeding up lookups of that session id. By carefully measuring the amount of time it takes to look up a session, an attacker may be able to find a valid session id and hijack the session. The session id itself may be generated randomly, but the way the session is indexed by the backing store does not use a secure comparison.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.aarch64",
"openSUSE Tumbleweed:ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.ppc64le",
"openSUSE Tumbleweed:ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.s390x",
"openSUSE Tumbleweed:ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-16782",
"url": "https://www.suse.com/security/cve/CVE-2019-16782"
},
{
"category": "external",
"summary": "SUSE Bug 1159548 for CVE-2019-16782",
"url": "https://bugzilla.suse.com/1159548"
},
{
"category": "external",
"summary": "SUSE Bug 1183174 for CVE-2019-16782",
"url": "https://bugzilla.suse.com/1183174"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.aarch64",
"openSUSE Tumbleweed:ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.ppc64le",
"openSUSE Tumbleweed:ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.s390x",
"openSUSE Tumbleweed:ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.aarch64",
"openSUSE Tumbleweed:ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.ppc64le",
"openSUSE Tumbleweed:ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.s390x",
"openSUSE Tumbleweed:ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-16782"
},
{
"cve": "CVE-2019-5418",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5418"
}
],
"notes": [
{
"category": "general",
"text": "There is a File Content Disclosure vulnerability in Action View \u003c5.2.2.1, \u003c5.1.6.2, \u003c5.0.7.2, \u003c4.2.11.1 and v3 where specially crafted accept headers can cause contents of arbitrary files on the target system\u0027s filesystem to be exposed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.aarch64",
"openSUSE Tumbleweed:ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.ppc64le",
"openSUSE Tumbleweed:ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.s390x",
"openSUSE Tumbleweed:ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5418",
"url": "https://www.suse.com/security/cve/CVE-2019-5418"
},
{
"category": "external",
"summary": "SUSE Bug 1129272 for CVE-2019-5418",
"url": "https://bugzilla.suse.com/1129272"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.aarch64",
"openSUSE Tumbleweed:ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.ppc64le",
"openSUSE Tumbleweed:ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.s390x",
"openSUSE Tumbleweed:ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.aarch64",
"openSUSE Tumbleweed:ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.ppc64le",
"openSUSE Tumbleweed:ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.s390x",
"openSUSE Tumbleweed:ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-5418"
},
{
"cve": "CVE-2020-8164",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-8164"
}
],
"notes": [
{
"category": "general",
"text": "A deserialization of untrusted data vulnerability exists in rails \u003c 5.2.4.3, rails \u003c 6.0.3.1 which can allow an attacker to supply information can be inadvertently leaked fromStrong Parameters.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.aarch64",
"openSUSE Tumbleweed:ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.ppc64le",
"openSUSE Tumbleweed:ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.s390x",
"openSUSE Tumbleweed:ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-8164",
"url": "https://www.suse.com/security/cve/CVE-2020-8164"
},
{
"category": "external",
"summary": "SUSE Bug 1172177 for CVE-2020-8164",
"url": "https://bugzilla.suse.com/1172177"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.aarch64",
"openSUSE Tumbleweed:ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.ppc64le",
"openSUSE Tumbleweed:ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.s390x",
"openSUSE Tumbleweed:ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.aarch64",
"openSUSE Tumbleweed:ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.ppc64le",
"openSUSE Tumbleweed:ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.s390x",
"openSUSE Tumbleweed:ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2020-8164"
},
{
"cve": "CVE-2020-8166",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-8166"
}
],
"notes": [
{
"category": "general",
"text": "A CSRF forgery vulnerability exists in rails \u003c 5.2.5, rails \u003c 6.0.4 that makes it possible for an attacker to, given a global CSRF token such as the one present in the authenticity_token meta tag, forge a per-form CSRF token.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.aarch64",
"openSUSE Tumbleweed:ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.ppc64le",
"openSUSE Tumbleweed:ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.s390x",
"openSUSE Tumbleweed:ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-8166",
"url": "https://www.suse.com/security/cve/CVE-2020-8166"
},
{
"category": "external",
"summary": "SUSE Bug 1172182 for CVE-2020-8166",
"url": "https://bugzilla.suse.com/1172182"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.aarch64",
"openSUSE Tumbleweed:ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.ppc64le",
"openSUSE Tumbleweed:ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.s390x",
"openSUSE Tumbleweed:ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.aarch64",
"openSUSE Tumbleweed:ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.ppc64le",
"openSUSE Tumbleweed:ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.s390x",
"openSUSE Tumbleweed:ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-8166"
},
{
"cve": "CVE-2020-8185",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-8185"
}
],
"notes": [
{
"category": "general",
"text": "A denial of service vulnerability exists in Rails \u003c6.0.3.2 that allowed an untrusted user to run any pending migrations on a Rails app running in production.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.aarch64",
"openSUSE Tumbleweed:ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.ppc64le",
"openSUSE Tumbleweed:ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.s390x",
"openSUSE Tumbleweed:ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-8185",
"url": "https://www.suse.com/security/cve/CVE-2020-8185"
},
{
"category": "external",
"summary": "SUSE Bug 1173564 for CVE-2020-8185",
"url": "https://bugzilla.suse.com/1173564"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.aarch64",
"openSUSE Tumbleweed:ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.ppc64le",
"openSUSE Tumbleweed:ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.s390x",
"openSUSE Tumbleweed:ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.aarch64",
"openSUSE Tumbleweed:ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.ppc64le",
"openSUSE Tumbleweed:ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.s390x",
"openSUSE Tumbleweed:ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-8185"
},
{
"cve": "CVE-2020-8264",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-8264"
}
],
"notes": [
{
"category": "general",
"text": "In actionpack gem \u003e= 6.0.0, a possible XSS vulnerability exists when an application is running in development mode allowing an attacker to send or embed (in another page) a specially crafted URL which can allow the attacker to execute JavaScript in the context of the local application. This vulnerability is in the Actionable Exceptions middleware.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.aarch64",
"openSUSE Tumbleweed:ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.ppc64le",
"openSUSE Tumbleweed:ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.s390x",
"openSUSE Tumbleweed:ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-8264",
"url": "https://www.suse.com/security/cve/CVE-2020-8264"
},
{
"category": "external",
"summary": "SUSE Bug 1177521 for CVE-2020-8264",
"url": "https://bugzilla.suse.com/1177521"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.aarch64",
"openSUSE Tumbleweed:ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.ppc64le",
"openSUSE Tumbleweed:ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.s390x",
"openSUSE Tumbleweed:ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.aarch64",
"openSUSE Tumbleweed:ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.ppc64le",
"openSUSE Tumbleweed:ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.s390x",
"openSUSE Tumbleweed:ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-8264"
},
{
"cve": "CVE-2021-22881",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-22881"
}
],
"notes": [
{
"category": "general",
"text": "The Host Authorization middleware in Action Pack before 6.1.2.1, 6.0.3.5 suffers from an open redirect vulnerability. Specially crafted `Host` headers in combination with certain \"allowed host\" formats can cause the Host Authorization middleware in Action Pack to redirect users to a malicious website. Impacted applications will have allowed hosts with a leading dot. When an allowed host contains a leading dot, a specially crafted `Host` header can be used to redirect to a malicious website.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.aarch64",
"openSUSE Tumbleweed:ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.ppc64le",
"openSUSE Tumbleweed:ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.s390x",
"openSUSE Tumbleweed:ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-22881",
"url": "https://www.suse.com/security/cve/CVE-2021-22881"
},
{
"category": "external",
"summary": "SUSE Bug 1182160 for CVE-2021-22881",
"url": "https://bugzilla.suse.com/1182160"
},
{
"category": "external",
"summary": "SUSE Bug 1185772 for CVE-2021-22881",
"url": "https://bugzilla.suse.com/1185772"
},
{
"category": "external",
"summary": "SUSE Bug 1189627 for CVE-2021-22881",
"url": "https://bugzilla.suse.com/1189627"
},
{
"category": "external",
"summary": "SUSE Bug 1193764 for CVE-2021-22881",
"url": "https://bugzilla.suse.com/1193764"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.aarch64",
"openSUSE Tumbleweed:ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.ppc64le",
"openSUSE Tumbleweed:ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.s390x",
"openSUSE Tumbleweed:ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.aarch64",
"openSUSE Tumbleweed:ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.ppc64le",
"openSUSE Tumbleweed:ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.s390x",
"openSUSE Tumbleweed:ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-22881"
},
{
"cve": "CVE-2021-22885",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-22885"
}
],
"notes": [
{
"category": "general",
"text": "A possible information disclosure / unintended method execution vulnerability in Action Pack \u003e= 2.0.0 when using the `redirect_to` or `polymorphic_url`helper with untrusted user input.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.aarch64",
"openSUSE Tumbleweed:ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.ppc64le",
"openSUSE Tumbleweed:ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.s390x",
"openSUSE Tumbleweed:ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-22885",
"url": "https://www.suse.com/security/cve/CVE-2021-22885"
},
{
"category": "external",
"summary": "SUSE Bug 1185715 for CVE-2021-22885",
"url": "https://bugzilla.suse.com/1185715"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.aarch64",
"openSUSE Tumbleweed:ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.ppc64le",
"openSUSE Tumbleweed:ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.s390x",
"openSUSE Tumbleweed:ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.aarch64",
"openSUSE Tumbleweed:ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.ppc64le",
"openSUSE Tumbleweed:ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.s390x",
"openSUSE Tumbleweed:ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2021-22885"
},
{
"cve": "CVE-2021-22902",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-22902"
}
],
"notes": [
{
"category": "general",
"text": "The actionpack ruby gem (a framework for handling and responding to web requests in Rails) before 6.0.3.7, 6.1.3.2 suffers from a possible denial of service vulnerability in the Mime type parser of Action Dispatch. Carefully crafted Accept headers can cause the mime type parser in Action Dispatch to do catastrophic backtracking in the regular expression engine.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.aarch64",
"openSUSE Tumbleweed:ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.ppc64le",
"openSUSE Tumbleweed:ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.s390x",
"openSUSE Tumbleweed:ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-22902",
"url": "https://www.suse.com/security/cve/CVE-2021-22902"
},
{
"category": "external",
"summary": "SUSE Bug 1185771 for CVE-2021-22902",
"url": "https://bugzilla.suse.com/1185771"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.aarch64",
"openSUSE Tumbleweed:ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.ppc64le",
"openSUSE Tumbleweed:ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.s390x",
"openSUSE Tumbleweed:ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.aarch64",
"openSUSE Tumbleweed:ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.ppc64le",
"openSUSE Tumbleweed:ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.s390x",
"openSUSE Tumbleweed:ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-22902"
},
{
"cve": "CVE-2021-22904",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-22904"
}
],
"notes": [
{
"category": "general",
"text": "The actionpack ruby gem before 6.1.3.2, 6.0.3.7, 5.2.4.6, 5.2.6 suffers from a possible denial of service vulnerability in the Token Authentication logic in Action Controller due to a too permissive regular expression. Impacted code uses `authenticate_or_request_with_http_token` or `authenticate_with_http_token` for request authentication.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.aarch64",
"openSUSE Tumbleweed:ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.ppc64le",
"openSUSE Tumbleweed:ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.s390x",
"openSUSE Tumbleweed:ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-22904",
"url": "https://www.suse.com/security/cve/CVE-2021-22904"
},
{
"category": "external",
"summary": "SUSE Bug 1185780 for CVE-2021-22904",
"url": "https://bugzilla.suse.com/1185780"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.aarch64",
"openSUSE Tumbleweed:ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.ppc64le",
"openSUSE Tumbleweed:ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.s390x",
"openSUSE Tumbleweed:ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.aarch64",
"openSUSE Tumbleweed:ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.ppc64le",
"openSUSE Tumbleweed:ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.s390x",
"openSUSE Tumbleweed:ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2021-22904"
},
{
"cve": "CVE-2021-22942",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-22942"
}
],
"notes": [
{
"category": "general",
"text": "A possible open redirect vulnerability in the Host Authorization middleware in Action Pack \u003e= 6.0.0 that could allow attackers to redirect users to a malicious website.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.aarch64",
"openSUSE Tumbleweed:ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.ppc64le",
"openSUSE Tumbleweed:ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.s390x",
"openSUSE Tumbleweed:ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-22942",
"url": "https://www.suse.com/security/cve/CVE-2021-22942"
},
{
"category": "external",
"summary": "SUSE Bug 1189627 for CVE-2021-22942",
"url": "https://bugzilla.suse.com/1189627"
},
{
"category": "external",
"summary": "SUSE Bug 1193764 for CVE-2021-22942",
"url": "https://bugzilla.suse.com/1193764"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.aarch64",
"openSUSE Tumbleweed:ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.ppc64le",
"openSUSE Tumbleweed:ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.s390x",
"openSUSE Tumbleweed:ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.aarch64",
"openSUSE Tumbleweed:ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.ppc64le",
"openSUSE Tumbleweed:ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.s390x",
"openSUSE Tumbleweed:ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-22942"
},
{
"cve": "CVE-2021-44528",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-44528"
}
],
"notes": [
{
"category": "general",
"text": "A open redirect vulnerability exists in Action Pack \u003e= 6.0.0 that could allow an attacker to craft a \"X-Forwarded-Host\" headers in combination with certain \"allowed host\" formats can cause the Host Authorization middleware in Action Pack to redirect users to a malicious website.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.aarch64",
"openSUSE Tumbleweed:ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.ppc64le",
"openSUSE Tumbleweed:ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.s390x",
"openSUSE Tumbleweed:ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-44528",
"url": "https://www.suse.com/security/cve/CVE-2021-44528"
},
{
"category": "external",
"summary": "SUSE Bug 1193764 for CVE-2021-44528",
"url": "https://bugzilla.suse.com/1193764"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.aarch64",
"openSUSE Tumbleweed:ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.ppc64le",
"openSUSE Tumbleweed:ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.s390x",
"openSUSE Tumbleweed:ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.aarch64",
"openSUSE Tumbleweed:ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.ppc64le",
"openSUSE Tumbleweed:ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.s390x",
"openSUSE Tumbleweed:ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-44528"
}
]
}
OPENSUSE-SU-2024:11318-1
Vulnerability from csaf_opensuse - Published: 2024-06-15 00:00 - Updated: 2024-06-15 00:00Summary
ruby2.7-rubygem-actionpack-6.0-6.0.4-1.2 on GA media
Notes
Title of the patch
ruby2.7-rubygem-actionpack-6.0-6.0.4-1.2 on GA media
Description of the patch
These are all security issues fixed in the ruby2.7-rubygem-actionpack-6.0-6.0.4-1.2 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2024-11318
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "ruby2.7-rubygem-actionpack-6.0-6.0.4-1.2 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the ruby2.7-rubygem-actionpack-6.0-6.0.4-1.2 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-11318",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_11318-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-16782 page",
"url": "https://www.suse.com/security/cve/CVE-2019-16782/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5418 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5418/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-8164 page",
"url": "https://www.suse.com/security/cve/CVE-2020-8164/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-8166 page",
"url": "https://www.suse.com/security/cve/CVE-2020-8166/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-8185 page",
"url": "https://www.suse.com/security/cve/CVE-2020-8185/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-8264 page",
"url": "https://www.suse.com/security/cve/CVE-2020-8264/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-22881 page",
"url": "https://www.suse.com/security/cve/CVE-2021-22881/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-22885 page",
"url": "https://www.suse.com/security/cve/CVE-2021-22885/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-22902 page",
"url": "https://www.suse.com/security/cve/CVE-2021-22902/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-22904 page",
"url": "https://www.suse.com/security/cve/CVE-2021-22904/"
}
],
"title": "ruby2.7-rubygem-actionpack-6.0-6.0.4-1.2 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:11318-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "ruby2.7-rubygem-actionpack-6.0-6.0.4-1.2.aarch64",
"product": {
"name": "ruby2.7-rubygem-actionpack-6.0-6.0.4-1.2.aarch64",
"product_id": "ruby2.7-rubygem-actionpack-6.0-6.0.4-1.2.aarch64"
}
},
{
"category": "product_version",
"name": "ruby3.0-rubygem-actionpack-6.0-6.0.4-1.2.aarch64",
"product": {
"name": "ruby3.0-rubygem-actionpack-6.0-6.0.4-1.2.aarch64",
"product_id": "ruby3.0-rubygem-actionpack-6.0-6.0.4-1.2.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby2.7-rubygem-actionpack-6.0-6.0.4-1.2.ppc64le",
"product": {
"name": "ruby2.7-rubygem-actionpack-6.0-6.0.4-1.2.ppc64le",
"product_id": "ruby2.7-rubygem-actionpack-6.0-6.0.4-1.2.ppc64le"
}
},
{
"category": "product_version",
"name": "ruby3.0-rubygem-actionpack-6.0-6.0.4-1.2.ppc64le",
"product": {
"name": "ruby3.0-rubygem-actionpack-6.0-6.0.4-1.2.ppc64le",
"product_id": "ruby3.0-rubygem-actionpack-6.0-6.0.4-1.2.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby2.7-rubygem-actionpack-6.0-6.0.4-1.2.s390x",
"product": {
"name": "ruby2.7-rubygem-actionpack-6.0-6.0.4-1.2.s390x",
"product_id": "ruby2.7-rubygem-actionpack-6.0-6.0.4-1.2.s390x"
}
},
{
"category": "product_version",
"name": "ruby3.0-rubygem-actionpack-6.0-6.0.4-1.2.s390x",
"product": {
"name": "ruby3.0-rubygem-actionpack-6.0-6.0.4-1.2.s390x",
"product_id": "ruby3.0-rubygem-actionpack-6.0-6.0.4-1.2.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby2.7-rubygem-actionpack-6.0-6.0.4-1.2.x86_64",
"product": {
"name": "ruby2.7-rubygem-actionpack-6.0-6.0.4-1.2.x86_64",
"product_id": "ruby2.7-rubygem-actionpack-6.0-6.0.4-1.2.x86_64"
}
},
{
"category": "product_version",
"name": "ruby3.0-rubygem-actionpack-6.0-6.0.4-1.2.x86_64",
"product": {
"name": "ruby3.0-rubygem-actionpack-6.0-6.0.4-1.2.x86_64",
"product_id": "ruby3.0-rubygem-actionpack-6.0-6.0.4-1.2.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.7-rubygem-actionpack-6.0-6.0.4-1.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:ruby2.7-rubygem-actionpack-6.0-6.0.4-1.2.aarch64"
},
"product_reference": "ruby2.7-rubygem-actionpack-6.0-6.0.4-1.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.7-rubygem-actionpack-6.0-6.0.4-1.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:ruby2.7-rubygem-actionpack-6.0-6.0.4-1.2.ppc64le"
},
"product_reference": "ruby2.7-rubygem-actionpack-6.0-6.0.4-1.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.7-rubygem-actionpack-6.0-6.0.4-1.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:ruby2.7-rubygem-actionpack-6.0-6.0.4-1.2.s390x"
},
"product_reference": "ruby2.7-rubygem-actionpack-6.0-6.0.4-1.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.7-rubygem-actionpack-6.0-6.0.4-1.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:ruby2.7-rubygem-actionpack-6.0-6.0.4-1.2.x86_64"
},
"product_reference": "ruby2.7-rubygem-actionpack-6.0-6.0.4-1.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby3.0-rubygem-actionpack-6.0-6.0.4-1.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:ruby3.0-rubygem-actionpack-6.0-6.0.4-1.2.aarch64"
},
"product_reference": "ruby3.0-rubygem-actionpack-6.0-6.0.4-1.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby3.0-rubygem-actionpack-6.0-6.0.4-1.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:ruby3.0-rubygem-actionpack-6.0-6.0.4-1.2.ppc64le"
},
"product_reference": "ruby3.0-rubygem-actionpack-6.0-6.0.4-1.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby3.0-rubygem-actionpack-6.0-6.0.4-1.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:ruby3.0-rubygem-actionpack-6.0-6.0.4-1.2.s390x"
},
"product_reference": "ruby3.0-rubygem-actionpack-6.0-6.0.4-1.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby3.0-rubygem-actionpack-6.0-6.0.4-1.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:ruby3.0-rubygem-actionpack-6.0-6.0.4-1.2.x86_64"
},
"product_reference": "ruby3.0-rubygem-actionpack-6.0-6.0.4-1.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-16782",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-16782"
}
],
"notes": [
{
"category": "general",
"text": "There\u0027s a possible information leak / session hijack vulnerability in Rack (RubyGem rack). This vulnerability is patched in versions 1.6.12 and 2.0.8. Attackers may be able to find and hijack sessions by using timing attacks targeting the session id. Session ids are usually stored and indexed in a database that uses some kind of scheme for speeding up lookups of that session id. By carefully measuring the amount of time it takes to look up a session, an attacker may be able to find a valid session id and hijack the session. The session id itself may be generated randomly, but the way the session is indexed by the backing store does not use a secure comparison.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ruby2.7-rubygem-actionpack-6.0-6.0.4-1.2.aarch64",
"openSUSE Tumbleweed:ruby2.7-rubygem-actionpack-6.0-6.0.4-1.2.ppc64le",
"openSUSE Tumbleweed:ruby2.7-rubygem-actionpack-6.0-6.0.4-1.2.s390x",
"openSUSE Tumbleweed:ruby2.7-rubygem-actionpack-6.0-6.0.4-1.2.x86_64",
"openSUSE Tumbleweed:ruby3.0-rubygem-actionpack-6.0-6.0.4-1.2.aarch64",
"openSUSE Tumbleweed:ruby3.0-rubygem-actionpack-6.0-6.0.4-1.2.ppc64le",
"openSUSE Tumbleweed:ruby3.0-rubygem-actionpack-6.0-6.0.4-1.2.s390x",
"openSUSE Tumbleweed:ruby3.0-rubygem-actionpack-6.0-6.0.4-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-16782",
"url": "https://www.suse.com/security/cve/CVE-2019-16782"
},
{
"category": "external",
"summary": "SUSE Bug 1159548 for CVE-2019-16782",
"url": "https://bugzilla.suse.com/1159548"
},
{
"category": "external",
"summary": "SUSE Bug 1183174 for CVE-2019-16782",
"url": "https://bugzilla.suse.com/1183174"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ruby2.7-rubygem-actionpack-6.0-6.0.4-1.2.aarch64",
"openSUSE Tumbleweed:ruby2.7-rubygem-actionpack-6.0-6.0.4-1.2.ppc64le",
"openSUSE Tumbleweed:ruby2.7-rubygem-actionpack-6.0-6.0.4-1.2.s390x",
"openSUSE Tumbleweed:ruby2.7-rubygem-actionpack-6.0-6.0.4-1.2.x86_64",
"openSUSE Tumbleweed:ruby3.0-rubygem-actionpack-6.0-6.0.4-1.2.aarch64",
"openSUSE Tumbleweed:ruby3.0-rubygem-actionpack-6.0-6.0.4-1.2.ppc64le",
"openSUSE Tumbleweed:ruby3.0-rubygem-actionpack-6.0-6.0.4-1.2.s390x",
"openSUSE Tumbleweed:ruby3.0-rubygem-actionpack-6.0-6.0.4-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:ruby2.7-rubygem-actionpack-6.0-6.0.4-1.2.aarch64",
"openSUSE Tumbleweed:ruby2.7-rubygem-actionpack-6.0-6.0.4-1.2.ppc64le",
"openSUSE Tumbleweed:ruby2.7-rubygem-actionpack-6.0-6.0.4-1.2.s390x",
"openSUSE Tumbleweed:ruby2.7-rubygem-actionpack-6.0-6.0.4-1.2.x86_64",
"openSUSE Tumbleweed:ruby3.0-rubygem-actionpack-6.0-6.0.4-1.2.aarch64",
"openSUSE Tumbleweed:ruby3.0-rubygem-actionpack-6.0-6.0.4-1.2.ppc64le",
"openSUSE Tumbleweed:ruby3.0-rubygem-actionpack-6.0-6.0.4-1.2.s390x",
"openSUSE Tumbleweed:ruby3.0-rubygem-actionpack-6.0-6.0.4-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-16782"
},
{
"cve": "CVE-2019-5418",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5418"
}
],
"notes": [
{
"category": "general",
"text": "There is a File Content Disclosure vulnerability in Action View \u003c5.2.2.1, \u003c5.1.6.2, \u003c5.0.7.2, \u003c4.2.11.1 and v3 where specially crafted accept headers can cause contents of arbitrary files on the target system\u0027s filesystem to be exposed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ruby2.7-rubygem-actionpack-6.0-6.0.4-1.2.aarch64",
"openSUSE Tumbleweed:ruby2.7-rubygem-actionpack-6.0-6.0.4-1.2.ppc64le",
"openSUSE Tumbleweed:ruby2.7-rubygem-actionpack-6.0-6.0.4-1.2.s390x",
"openSUSE Tumbleweed:ruby2.7-rubygem-actionpack-6.0-6.0.4-1.2.x86_64",
"openSUSE Tumbleweed:ruby3.0-rubygem-actionpack-6.0-6.0.4-1.2.aarch64",
"openSUSE Tumbleweed:ruby3.0-rubygem-actionpack-6.0-6.0.4-1.2.ppc64le",
"openSUSE Tumbleweed:ruby3.0-rubygem-actionpack-6.0-6.0.4-1.2.s390x",
"openSUSE Tumbleweed:ruby3.0-rubygem-actionpack-6.0-6.0.4-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5418",
"url": "https://www.suse.com/security/cve/CVE-2019-5418"
},
{
"category": "external",
"summary": "SUSE Bug 1129272 for CVE-2019-5418",
"url": "https://bugzilla.suse.com/1129272"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ruby2.7-rubygem-actionpack-6.0-6.0.4-1.2.aarch64",
"openSUSE Tumbleweed:ruby2.7-rubygem-actionpack-6.0-6.0.4-1.2.ppc64le",
"openSUSE Tumbleweed:ruby2.7-rubygem-actionpack-6.0-6.0.4-1.2.s390x",
"openSUSE Tumbleweed:ruby2.7-rubygem-actionpack-6.0-6.0.4-1.2.x86_64",
"openSUSE Tumbleweed:ruby3.0-rubygem-actionpack-6.0-6.0.4-1.2.aarch64",
"openSUSE Tumbleweed:ruby3.0-rubygem-actionpack-6.0-6.0.4-1.2.ppc64le",
"openSUSE Tumbleweed:ruby3.0-rubygem-actionpack-6.0-6.0.4-1.2.s390x",
"openSUSE Tumbleweed:ruby3.0-rubygem-actionpack-6.0-6.0.4-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:ruby2.7-rubygem-actionpack-6.0-6.0.4-1.2.aarch64",
"openSUSE Tumbleweed:ruby2.7-rubygem-actionpack-6.0-6.0.4-1.2.ppc64le",
"openSUSE Tumbleweed:ruby2.7-rubygem-actionpack-6.0-6.0.4-1.2.s390x",
"openSUSE Tumbleweed:ruby2.7-rubygem-actionpack-6.0-6.0.4-1.2.x86_64",
"openSUSE Tumbleweed:ruby3.0-rubygem-actionpack-6.0-6.0.4-1.2.aarch64",
"openSUSE Tumbleweed:ruby3.0-rubygem-actionpack-6.0-6.0.4-1.2.ppc64le",
"openSUSE Tumbleweed:ruby3.0-rubygem-actionpack-6.0-6.0.4-1.2.s390x",
"openSUSE Tumbleweed:ruby3.0-rubygem-actionpack-6.0-6.0.4-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-5418"
},
{
"cve": "CVE-2020-8164",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-8164"
}
],
"notes": [
{
"category": "general",
"text": "A deserialization of untrusted data vulnerability exists in rails \u003c 5.2.4.3, rails \u003c 6.0.3.1 which can allow an attacker to supply information can be inadvertently leaked fromStrong Parameters.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ruby2.7-rubygem-actionpack-6.0-6.0.4-1.2.aarch64",
"openSUSE Tumbleweed:ruby2.7-rubygem-actionpack-6.0-6.0.4-1.2.ppc64le",
"openSUSE Tumbleweed:ruby2.7-rubygem-actionpack-6.0-6.0.4-1.2.s390x",
"openSUSE Tumbleweed:ruby2.7-rubygem-actionpack-6.0-6.0.4-1.2.x86_64",
"openSUSE Tumbleweed:ruby3.0-rubygem-actionpack-6.0-6.0.4-1.2.aarch64",
"openSUSE Tumbleweed:ruby3.0-rubygem-actionpack-6.0-6.0.4-1.2.ppc64le",
"openSUSE Tumbleweed:ruby3.0-rubygem-actionpack-6.0-6.0.4-1.2.s390x",
"openSUSE Tumbleweed:ruby3.0-rubygem-actionpack-6.0-6.0.4-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-8164",
"url": "https://www.suse.com/security/cve/CVE-2020-8164"
},
{
"category": "external",
"summary": "SUSE Bug 1172177 for CVE-2020-8164",
"url": "https://bugzilla.suse.com/1172177"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ruby2.7-rubygem-actionpack-6.0-6.0.4-1.2.aarch64",
"openSUSE Tumbleweed:ruby2.7-rubygem-actionpack-6.0-6.0.4-1.2.ppc64le",
"openSUSE Tumbleweed:ruby2.7-rubygem-actionpack-6.0-6.0.4-1.2.s390x",
"openSUSE Tumbleweed:ruby2.7-rubygem-actionpack-6.0-6.0.4-1.2.x86_64",
"openSUSE Tumbleweed:ruby3.0-rubygem-actionpack-6.0-6.0.4-1.2.aarch64",
"openSUSE Tumbleweed:ruby3.0-rubygem-actionpack-6.0-6.0.4-1.2.ppc64le",
"openSUSE Tumbleweed:ruby3.0-rubygem-actionpack-6.0-6.0.4-1.2.s390x",
"openSUSE Tumbleweed:ruby3.0-rubygem-actionpack-6.0-6.0.4-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:ruby2.7-rubygem-actionpack-6.0-6.0.4-1.2.aarch64",
"openSUSE Tumbleweed:ruby2.7-rubygem-actionpack-6.0-6.0.4-1.2.ppc64le",
"openSUSE Tumbleweed:ruby2.7-rubygem-actionpack-6.0-6.0.4-1.2.s390x",
"openSUSE Tumbleweed:ruby2.7-rubygem-actionpack-6.0-6.0.4-1.2.x86_64",
"openSUSE Tumbleweed:ruby3.0-rubygem-actionpack-6.0-6.0.4-1.2.aarch64",
"openSUSE Tumbleweed:ruby3.0-rubygem-actionpack-6.0-6.0.4-1.2.ppc64le",
"openSUSE Tumbleweed:ruby3.0-rubygem-actionpack-6.0-6.0.4-1.2.s390x",
"openSUSE Tumbleweed:ruby3.0-rubygem-actionpack-6.0-6.0.4-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2020-8164"
},
{
"cve": "CVE-2020-8166",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-8166"
}
],
"notes": [
{
"category": "general",
"text": "A CSRF forgery vulnerability exists in rails \u003c 5.2.5, rails \u003c 6.0.4 that makes it possible for an attacker to, given a global CSRF token such as the one present in the authenticity_token meta tag, forge a per-form CSRF token.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ruby2.7-rubygem-actionpack-6.0-6.0.4-1.2.aarch64",
"openSUSE Tumbleweed:ruby2.7-rubygem-actionpack-6.0-6.0.4-1.2.ppc64le",
"openSUSE Tumbleweed:ruby2.7-rubygem-actionpack-6.0-6.0.4-1.2.s390x",
"openSUSE Tumbleweed:ruby2.7-rubygem-actionpack-6.0-6.0.4-1.2.x86_64",
"openSUSE Tumbleweed:ruby3.0-rubygem-actionpack-6.0-6.0.4-1.2.aarch64",
"openSUSE Tumbleweed:ruby3.0-rubygem-actionpack-6.0-6.0.4-1.2.ppc64le",
"openSUSE Tumbleweed:ruby3.0-rubygem-actionpack-6.0-6.0.4-1.2.s390x",
"openSUSE Tumbleweed:ruby3.0-rubygem-actionpack-6.0-6.0.4-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-8166",
"url": "https://www.suse.com/security/cve/CVE-2020-8166"
},
{
"category": "external",
"summary": "SUSE Bug 1172182 for CVE-2020-8166",
"url": "https://bugzilla.suse.com/1172182"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ruby2.7-rubygem-actionpack-6.0-6.0.4-1.2.aarch64",
"openSUSE Tumbleweed:ruby2.7-rubygem-actionpack-6.0-6.0.4-1.2.ppc64le",
"openSUSE Tumbleweed:ruby2.7-rubygem-actionpack-6.0-6.0.4-1.2.s390x",
"openSUSE Tumbleweed:ruby2.7-rubygem-actionpack-6.0-6.0.4-1.2.x86_64",
"openSUSE Tumbleweed:ruby3.0-rubygem-actionpack-6.0-6.0.4-1.2.aarch64",
"openSUSE Tumbleweed:ruby3.0-rubygem-actionpack-6.0-6.0.4-1.2.ppc64le",
"openSUSE Tumbleweed:ruby3.0-rubygem-actionpack-6.0-6.0.4-1.2.s390x",
"openSUSE Tumbleweed:ruby3.0-rubygem-actionpack-6.0-6.0.4-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:ruby2.7-rubygem-actionpack-6.0-6.0.4-1.2.aarch64",
"openSUSE Tumbleweed:ruby2.7-rubygem-actionpack-6.0-6.0.4-1.2.ppc64le",
"openSUSE Tumbleweed:ruby2.7-rubygem-actionpack-6.0-6.0.4-1.2.s390x",
"openSUSE Tumbleweed:ruby2.7-rubygem-actionpack-6.0-6.0.4-1.2.x86_64",
"openSUSE Tumbleweed:ruby3.0-rubygem-actionpack-6.0-6.0.4-1.2.aarch64",
"openSUSE Tumbleweed:ruby3.0-rubygem-actionpack-6.0-6.0.4-1.2.ppc64le",
"openSUSE Tumbleweed:ruby3.0-rubygem-actionpack-6.0-6.0.4-1.2.s390x",
"openSUSE Tumbleweed:ruby3.0-rubygem-actionpack-6.0-6.0.4-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-8166"
},
{
"cve": "CVE-2020-8185",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-8185"
}
],
"notes": [
{
"category": "general",
"text": "A denial of service vulnerability exists in Rails \u003c6.0.3.2 that allowed an untrusted user to run any pending migrations on a Rails app running in production.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ruby2.7-rubygem-actionpack-6.0-6.0.4-1.2.aarch64",
"openSUSE Tumbleweed:ruby2.7-rubygem-actionpack-6.0-6.0.4-1.2.ppc64le",
"openSUSE Tumbleweed:ruby2.7-rubygem-actionpack-6.0-6.0.4-1.2.s390x",
"openSUSE Tumbleweed:ruby2.7-rubygem-actionpack-6.0-6.0.4-1.2.x86_64",
"openSUSE Tumbleweed:ruby3.0-rubygem-actionpack-6.0-6.0.4-1.2.aarch64",
"openSUSE Tumbleweed:ruby3.0-rubygem-actionpack-6.0-6.0.4-1.2.ppc64le",
"openSUSE Tumbleweed:ruby3.0-rubygem-actionpack-6.0-6.0.4-1.2.s390x",
"openSUSE Tumbleweed:ruby3.0-rubygem-actionpack-6.0-6.0.4-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-8185",
"url": "https://www.suse.com/security/cve/CVE-2020-8185"
},
{
"category": "external",
"summary": "SUSE Bug 1173564 for CVE-2020-8185",
"url": "https://bugzilla.suse.com/1173564"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ruby2.7-rubygem-actionpack-6.0-6.0.4-1.2.aarch64",
"openSUSE Tumbleweed:ruby2.7-rubygem-actionpack-6.0-6.0.4-1.2.ppc64le",
"openSUSE Tumbleweed:ruby2.7-rubygem-actionpack-6.0-6.0.4-1.2.s390x",
"openSUSE Tumbleweed:ruby2.7-rubygem-actionpack-6.0-6.0.4-1.2.x86_64",
"openSUSE Tumbleweed:ruby3.0-rubygem-actionpack-6.0-6.0.4-1.2.aarch64",
"openSUSE Tumbleweed:ruby3.0-rubygem-actionpack-6.0-6.0.4-1.2.ppc64le",
"openSUSE Tumbleweed:ruby3.0-rubygem-actionpack-6.0-6.0.4-1.2.s390x",
"openSUSE Tumbleweed:ruby3.0-rubygem-actionpack-6.0-6.0.4-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:ruby2.7-rubygem-actionpack-6.0-6.0.4-1.2.aarch64",
"openSUSE Tumbleweed:ruby2.7-rubygem-actionpack-6.0-6.0.4-1.2.ppc64le",
"openSUSE Tumbleweed:ruby2.7-rubygem-actionpack-6.0-6.0.4-1.2.s390x",
"openSUSE Tumbleweed:ruby2.7-rubygem-actionpack-6.0-6.0.4-1.2.x86_64",
"openSUSE Tumbleweed:ruby3.0-rubygem-actionpack-6.0-6.0.4-1.2.aarch64",
"openSUSE Tumbleweed:ruby3.0-rubygem-actionpack-6.0-6.0.4-1.2.ppc64le",
"openSUSE Tumbleweed:ruby3.0-rubygem-actionpack-6.0-6.0.4-1.2.s390x",
"openSUSE Tumbleweed:ruby3.0-rubygem-actionpack-6.0-6.0.4-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-8185"
},
{
"cve": "CVE-2020-8264",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-8264"
}
],
"notes": [
{
"category": "general",
"text": "In actionpack gem \u003e= 6.0.0, a possible XSS vulnerability exists when an application is running in development mode allowing an attacker to send or embed (in another page) a specially crafted URL which can allow the attacker to execute JavaScript in the context of the local application. This vulnerability is in the Actionable Exceptions middleware.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ruby2.7-rubygem-actionpack-6.0-6.0.4-1.2.aarch64",
"openSUSE Tumbleweed:ruby2.7-rubygem-actionpack-6.0-6.0.4-1.2.ppc64le",
"openSUSE Tumbleweed:ruby2.7-rubygem-actionpack-6.0-6.0.4-1.2.s390x",
"openSUSE Tumbleweed:ruby2.7-rubygem-actionpack-6.0-6.0.4-1.2.x86_64",
"openSUSE Tumbleweed:ruby3.0-rubygem-actionpack-6.0-6.0.4-1.2.aarch64",
"openSUSE Tumbleweed:ruby3.0-rubygem-actionpack-6.0-6.0.4-1.2.ppc64le",
"openSUSE Tumbleweed:ruby3.0-rubygem-actionpack-6.0-6.0.4-1.2.s390x",
"openSUSE Tumbleweed:ruby3.0-rubygem-actionpack-6.0-6.0.4-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-8264",
"url": "https://www.suse.com/security/cve/CVE-2020-8264"
},
{
"category": "external",
"summary": "SUSE Bug 1177521 for CVE-2020-8264",
"url": "https://bugzilla.suse.com/1177521"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ruby2.7-rubygem-actionpack-6.0-6.0.4-1.2.aarch64",
"openSUSE Tumbleweed:ruby2.7-rubygem-actionpack-6.0-6.0.4-1.2.ppc64le",
"openSUSE Tumbleweed:ruby2.7-rubygem-actionpack-6.0-6.0.4-1.2.s390x",
"openSUSE Tumbleweed:ruby2.7-rubygem-actionpack-6.0-6.0.4-1.2.x86_64",
"openSUSE Tumbleweed:ruby3.0-rubygem-actionpack-6.0-6.0.4-1.2.aarch64",
"openSUSE Tumbleweed:ruby3.0-rubygem-actionpack-6.0-6.0.4-1.2.ppc64le",
"openSUSE Tumbleweed:ruby3.0-rubygem-actionpack-6.0-6.0.4-1.2.s390x",
"openSUSE Tumbleweed:ruby3.0-rubygem-actionpack-6.0-6.0.4-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:ruby2.7-rubygem-actionpack-6.0-6.0.4-1.2.aarch64",
"openSUSE Tumbleweed:ruby2.7-rubygem-actionpack-6.0-6.0.4-1.2.ppc64le",
"openSUSE Tumbleweed:ruby2.7-rubygem-actionpack-6.0-6.0.4-1.2.s390x",
"openSUSE Tumbleweed:ruby2.7-rubygem-actionpack-6.0-6.0.4-1.2.x86_64",
"openSUSE Tumbleweed:ruby3.0-rubygem-actionpack-6.0-6.0.4-1.2.aarch64",
"openSUSE Tumbleweed:ruby3.0-rubygem-actionpack-6.0-6.0.4-1.2.ppc64le",
"openSUSE Tumbleweed:ruby3.0-rubygem-actionpack-6.0-6.0.4-1.2.s390x",
"openSUSE Tumbleweed:ruby3.0-rubygem-actionpack-6.0-6.0.4-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-8264"
},
{
"cve": "CVE-2021-22881",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-22881"
}
],
"notes": [
{
"category": "general",
"text": "The Host Authorization middleware in Action Pack before 6.1.2.1, 6.0.3.5 suffers from an open redirect vulnerability. Specially crafted `Host` headers in combination with certain \"allowed host\" formats can cause the Host Authorization middleware in Action Pack to redirect users to a malicious website. Impacted applications will have allowed hosts with a leading dot. When an allowed host contains a leading dot, a specially crafted `Host` header can be used to redirect to a malicious website.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ruby2.7-rubygem-actionpack-6.0-6.0.4-1.2.aarch64",
"openSUSE Tumbleweed:ruby2.7-rubygem-actionpack-6.0-6.0.4-1.2.ppc64le",
"openSUSE Tumbleweed:ruby2.7-rubygem-actionpack-6.0-6.0.4-1.2.s390x",
"openSUSE Tumbleweed:ruby2.7-rubygem-actionpack-6.0-6.0.4-1.2.x86_64",
"openSUSE Tumbleweed:ruby3.0-rubygem-actionpack-6.0-6.0.4-1.2.aarch64",
"openSUSE Tumbleweed:ruby3.0-rubygem-actionpack-6.0-6.0.4-1.2.ppc64le",
"openSUSE Tumbleweed:ruby3.0-rubygem-actionpack-6.0-6.0.4-1.2.s390x",
"openSUSE Tumbleweed:ruby3.0-rubygem-actionpack-6.0-6.0.4-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-22881",
"url": "https://www.suse.com/security/cve/CVE-2021-22881"
},
{
"category": "external",
"summary": "SUSE Bug 1182160 for CVE-2021-22881",
"url": "https://bugzilla.suse.com/1182160"
},
{
"category": "external",
"summary": "SUSE Bug 1185772 for CVE-2021-22881",
"url": "https://bugzilla.suse.com/1185772"
},
{
"category": "external",
"summary": "SUSE Bug 1189627 for CVE-2021-22881",
"url": "https://bugzilla.suse.com/1189627"
},
{
"category": "external",
"summary": "SUSE Bug 1193764 for CVE-2021-22881",
"url": "https://bugzilla.suse.com/1193764"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ruby2.7-rubygem-actionpack-6.0-6.0.4-1.2.aarch64",
"openSUSE Tumbleweed:ruby2.7-rubygem-actionpack-6.0-6.0.4-1.2.ppc64le",
"openSUSE Tumbleweed:ruby2.7-rubygem-actionpack-6.0-6.0.4-1.2.s390x",
"openSUSE Tumbleweed:ruby2.7-rubygem-actionpack-6.0-6.0.4-1.2.x86_64",
"openSUSE Tumbleweed:ruby3.0-rubygem-actionpack-6.0-6.0.4-1.2.aarch64",
"openSUSE Tumbleweed:ruby3.0-rubygem-actionpack-6.0-6.0.4-1.2.ppc64le",
"openSUSE Tumbleweed:ruby3.0-rubygem-actionpack-6.0-6.0.4-1.2.s390x",
"openSUSE Tumbleweed:ruby3.0-rubygem-actionpack-6.0-6.0.4-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:ruby2.7-rubygem-actionpack-6.0-6.0.4-1.2.aarch64",
"openSUSE Tumbleweed:ruby2.7-rubygem-actionpack-6.0-6.0.4-1.2.ppc64le",
"openSUSE Tumbleweed:ruby2.7-rubygem-actionpack-6.0-6.0.4-1.2.s390x",
"openSUSE Tumbleweed:ruby2.7-rubygem-actionpack-6.0-6.0.4-1.2.x86_64",
"openSUSE Tumbleweed:ruby3.0-rubygem-actionpack-6.0-6.0.4-1.2.aarch64",
"openSUSE Tumbleweed:ruby3.0-rubygem-actionpack-6.0-6.0.4-1.2.ppc64le",
"openSUSE Tumbleweed:ruby3.0-rubygem-actionpack-6.0-6.0.4-1.2.s390x",
"openSUSE Tumbleweed:ruby3.0-rubygem-actionpack-6.0-6.0.4-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-22881"
},
{
"cve": "CVE-2021-22885",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-22885"
}
],
"notes": [
{
"category": "general",
"text": "A possible information disclosure / unintended method execution vulnerability in Action Pack \u003e= 2.0.0 when using the `redirect_to` or `polymorphic_url`helper with untrusted user input.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ruby2.7-rubygem-actionpack-6.0-6.0.4-1.2.aarch64",
"openSUSE Tumbleweed:ruby2.7-rubygem-actionpack-6.0-6.0.4-1.2.ppc64le",
"openSUSE Tumbleweed:ruby2.7-rubygem-actionpack-6.0-6.0.4-1.2.s390x",
"openSUSE Tumbleweed:ruby2.7-rubygem-actionpack-6.0-6.0.4-1.2.x86_64",
"openSUSE Tumbleweed:ruby3.0-rubygem-actionpack-6.0-6.0.4-1.2.aarch64",
"openSUSE Tumbleweed:ruby3.0-rubygem-actionpack-6.0-6.0.4-1.2.ppc64le",
"openSUSE Tumbleweed:ruby3.0-rubygem-actionpack-6.0-6.0.4-1.2.s390x",
"openSUSE Tumbleweed:ruby3.0-rubygem-actionpack-6.0-6.0.4-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-22885",
"url": "https://www.suse.com/security/cve/CVE-2021-22885"
},
{
"category": "external",
"summary": "SUSE Bug 1185715 for CVE-2021-22885",
"url": "https://bugzilla.suse.com/1185715"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ruby2.7-rubygem-actionpack-6.0-6.0.4-1.2.aarch64",
"openSUSE Tumbleweed:ruby2.7-rubygem-actionpack-6.0-6.0.4-1.2.ppc64le",
"openSUSE Tumbleweed:ruby2.7-rubygem-actionpack-6.0-6.0.4-1.2.s390x",
"openSUSE Tumbleweed:ruby2.7-rubygem-actionpack-6.0-6.0.4-1.2.x86_64",
"openSUSE Tumbleweed:ruby3.0-rubygem-actionpack-6.0-6.0.4-1.2.aarch64",
"openSUSE Tumbleweed:ruby3.0-rubygem-actionpack-6.0-6.0.4-1.2.ppc64le",
"openSUSE Tumbleweed:ruby3.0-rubygem-actionpack-6.0-6.0.4-1.2.s390x",
"openSUSE Tumbleweed:ruby3.0-rubygem-actionpack-6.0-6.0.4-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:ruby2.7-rubygem-actionpack-6.0-6.0.4-1.2.aarch64",
"openSUSE Tumbleweed:ruby2.7-rubygem-actionpack-6.0-6.0.4-1.2.ppc64le",
"openSUSE Tumbleweed:ruby2.7-rubygem-actionpack-6.0-6.0.4-1.2.s390x",
"openSUSE Tumbleweed:ruby2.7-rubygem-actionpack-6.0-6.0.4-1.2.x86_64",
"openSUSE Tumbleweed:ruby3.0-rubygem-actionpack-6.0-6.0.4-1.2.aarch64",
"openSUSE Tumbleweed:ruby3.0-rubygem-actionpack-6.0-6.0.4-1.2.ppc64le",
"openSUSE Tumbleweed:ruby3.0-rubygem-actionpack-6.0-6.0.4-1.2.s390x",
"openSUSE Tumbleweed:ruby3.0-rubygem-actionpack-6.0-6.0.4-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2021-22885"
},
{
"cve": "CVE-2021-22902",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-22902"
}
],
"notes": [
{
"category": "general",
"text": "The actionpack ruby gem (a framework for handling and responding to web requests in Rails) before 6.0.3.7, 6.1.3.2 suffers from a possible denial of service vulnerability in the Mime type parser of Action Dispatch. Carefully crafted Accept headers can cause the mime type parser in Action Dispatch to do catastrophic backtracking in the regular expression engine.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ruby2.7-rubygem-actionpack-6.0-6.0.4-1.2.aarch64",
"openSUSE Tumbleweed:ruby2.7-rubygem-actionpack-6.0-6.0.4-1.2.ppc64le",
"openSUSE Tumbleweed:ruby2.7-rubygem-actionpack-6.0-6.0.4-1.2.s390x",
"openSUSE Tumbleweed:ruby2.7-rubygem-actionpack-6.0-6.0.4-1.2.x86_64",
"openSUSE Tumbleweed:ruby3.0-rubygem-actionpack-6.0-6.0.4-1.2.aarch64",
"openSUSE Tumbleweed:ruby3.0-rubygem-actionpack-6.0-6.0.4-1.2.ppc64le",
"openSUSE Tumbleweed:ruby3.0-rubygem-actionpack-6.0-6.0.4-1.2.s390x",
"openSUSE Tumbleweed:ruby3.0-rubygem-actionpack-6.0-6.0.4-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-22902",
"url": "https://www.suse.com/security/cve/CVE-2021-22902"
},
{
"category": "external",
"summary": "SUSE Bug 1185771 for CVE-2021-22902",
"url": "https://bugzilla.suse.com/1185771"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ruby2.7-rubygem-actionpack-6.0-6.0.4-1.2.aarch64",
"openSUSE Tumbleweed:ruby2.7-rubygem-actionpack-6.0-6.0.4-1.2.ppc64le",
"openSUSE Tumbleweed:ruby2.7-rubygem-actionpack-6.0-6.0.4-1.2.s390x",
"openSUSE Tumbleweed:ruby2.7-rubygem-actionpack-6.0-6.0.4-1.2.x86_64",
"openSUSE Tumbleweed:ruby3.0-rubygem-actionpack-6.0-6.0.4-1.2.aarch64",
"openSUSE Tumbleweed:ruby3.0-rubygem-actionpack-6.0-6.0.4-1.2.ppc64le",
"openSUSE Tumbleweed:ruby3.0-rubygem-actionpack-6.0-6.0.4-1.2.s390x",
"openSUSE Tumbleweed:ruby3.0-rubygem-actionpack-6.0-6.0.4-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:ruby2.7-rubygem-actionpack-6.0-6.0.4-1.2.aarch64",
"openSUSE Tumbleweed:ruby2.7-rubygem-actionpack-6.0-6.0.4-1.2.ppc64le",
"openSUSE Tumbleweed:ruby2.7-rubygem-actionpack-6.0-6.0.4-1.2.s390x",
"openSUSE Tumbleweed:ruby2.7-rubygem-actionpack-6.0-6.0.4-1.2.x86_64",
"openSUSE Tumbleweed:ruby3.0-rubygem-actionpack-6.0-6.0.4-1.2.aarch64",
"openSUSE Tumbleweed:ruby3.0-rubygem-actionpack-6.0-6.0.4-1.2.ppc64le",
"openSUSE Tumbleweed:ruby3.0-rubygem-actionpack-6.0-6.0.4-1.2.s390x",
"openSUSE Tumbleweed:ruby3.0-rubygem-actionpack-6.0-6.0.4-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-22902"
},
{
"cve": "CVE-2021-22904",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-22904"
}
],
"notes": [
{
"category": "general",
"text": "The actionpack ruby gem before 6.1.3.2, 6.0.3.7, 5.2.4.6, 5.2.6 suffers from a possible denial of service vulnerability in the Token Authentication logic in Action Controller due to a too permissive regular expression. Impacted code uses `authenticate_or_request_with_http_token` or `authenticate_with_http_token` for request authentication.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ruby2.7-rubygem-actionpack-6.0-6.0.4-1.2.aarch64",
"openSUSE Tumbleweed:ruby2.7-rubygem-actionpack-6.0-6.0.4-1.2.ppc64le",
"openSUSE Tumbleweed:ruby2.7-rubygem-actionpack-6.0-6.0.4-1.2.s390x",
"openSUSE Tumbleweed:ruby2.7-rubygem-actionpack-6.0-6.0.4-1.2.x86_64",
"openSUSE Tumbleweed:ruby3.0-rubygem-actionpack-6.0-6.0.4-1.2.aarch64",
"openSUSE Tumbleweed:ruby3.0-rubygem-actionpack-6.0-6.0.4-1.2.ppc64le",
"openSUSE Tumbleweed:ruby3.0-rubygem-actionpack-6.0-6.0.4-1.2.s390x",
"openSUSE Tumbleweed:ruby3.0-rubygem-actionpack-6.0-6.0.4-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-22904",
"url": "https://www.suse.com/security/cve/CVE-2021-22904"
},
{
"category": "external",
"summary": "SUSE Bug 1185780 for CVE-2021-22904",
"url": "https://bugzilla.suse.com/1185780"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ruby2.7-rubygem-actionpack-6.0-6.0.4-1.2.aarch64",
"openSUSE Tumbleweed:ruby2.7-rubygem-actionpack-6.0-6.0.4-1.2.ppc64le",
"openSUSE Tumbleweed:ruby2.7-rubygem-actionpack-6.0-6.0.4-1.2.s390x",
"openSUSE Tumbleweed:ruby2.7-rubygem-actionpack-6.0-6.0.4-1.2.x86_64",
"openSUSE Tumbleweed:ruby3.0-rubygem-actionpack-6.0-6.0.4-1.2.aarch64",
"openSUSE Tumbleweed:ruby3.0-rubygem-actionpack-6.0-6.0.4-1.2.ppc64le",
"openSUSE Tumbleweed:ruby3.0-rubygem-actionpack-6.0-6.0.4-1.2.s390x",
"openSUSE Tumbleweed:ruby3.0-rubygem-actionpack-6.0-6.0.4-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:ruby2.7-rubygem-actionpack-6.0-6.0.4-1.2.aarch64",
"openSUSE Tumbleweed:ruby2.7-rubygem-actionpack-6.0-6.0.4-1.2.ppc64le",
"openSUSE Tumbleweed:ruby2.7-rubygem-actionpack-6.0-6.0.4-1.2.s390x",
"openSUSE Tumbleweed:ruby2.7-rubygem-actionpack-6.0-6.0.4-1.2.x86_64",
"openSUSE Tumbleweed:ruby3.0-rubygem-actionpack-6.0-6.0.4-1.2.aarch64",
"openSUSE Tumbleweed:ruby3.0-rubygem-actionpack-6.0-6.0.4-1.2.ppc64le",
"openSUSE Tumbleweed:ruby3.0-rubygem-actionpack-6.0-6.0.4-1.2.s390x",
"openSUSE Tumbleweed:ruby3.0-rubygem-actionpack-6.0-6.0.4-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2021-22904"
}
]
}
FKIE_CVE-2021-22881
Vulnerability from fkie_nvd - Published: 2021-02-11 18:15 - Updated: 2024-11-21 05:50
Severity ?
Summary
The Host Authorization middleware in Action Pack before 6.1.2.1, 6.0.3.5 suffers from an open redirect vulnerability. Specially crafted `Host` headers in combination with certain "allowed host" formats can cause the Host Authorization middleware in Action Pack to redirect users to a malicious website. Impacted applications will have allowed hosts with a leading dot. When an allowed host contains a leading dot, a specially crafted `Host` header can be used to redirect to a malicious website.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| rubyonrails | rails | * | |
| rubyonrails | rails | * | |
| fedoraproject | fedora | 33 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:rubyonrails:rails:*:*:*:*:*:*:*:*",
"matchCriteriaId": "817BE0F5-136C-460E-816D-74B3F6663BA8",
"versionEndExcluding": "6.0.3.5",
"versionStartIncluding": "6.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rubyonrails:rails:*:*:*:*:*:*:*:*",
"matchCriteriaId": "98CE6993-089E-454B-8156-011E03FC3C94",
"versionEndExcluding": "6.1.2.1",
"versionStartIncluding": "6.1.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
"matchCriteriaId": "E460AA51-FCDA-46B9-AE97-E6676AA5E194",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Host Authorization middleware in Action Pack before 6.1.2.1, 6.0.3.5 suffers from an open redirect vulnerability. Specially crafted `Host` headers in combination with certain \"allowed host\" formats can cause the Host Authorization middleware in Action Pack to redirect users to a malicious website. Impacted applications will have allowed hosts with a leading dot. When an allowed host contains a leading dot, a specially crafted `Host` header can be used to redirect to a malicious website."
},
{
"lang": "es",
"value": "El middleware de Autorizaci\u00f3n de Host en Action Pack versiones anteriores a 6.1.2.1, 6.0.3.5 sufre una vulnerabilidad de redireccionamiento abierto.\u0026#xa0;Los encabezados \"Host\" especialmente dise\u00f1ados en combinaci\u00f3n con determinados formatos \"allowed host\" pueden causar que el middleware de Autorizaci\u00f3n del Host en Action Pack redireccione a los usuarios a un sitio web malicioso.\u0026#xa0;Las aplicaciones afectadas habr\u00e1n permitido hosts con un punto inicial.\u0026#xa0;Cuando un host permitido contiene un punto inicial, un encabezado \"Host\" especialmente dise\u00f1ado puede ser usado para redireccionar hacia un sitio web malicioso"
}
],
"id": "CVE-2021-22881",
"lastModified": "2024-11-21T05:50:49.740",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 4.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2021-02-11T18:15:17.460",
"references": [
{
"source": "support@hackerone.com",
"tags": [
"Mailing List",
"Mitigation",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2021/05/05/2"
},
{
"source": "support@hackerone.com",
"tags": [
"Mailing List",
"Mitigation",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2021/08/20/1"
},
{
"source": "support@hackerone.com",
"tags": [
"Exploit",
"Mailing List",
"Patch"
],
"url": "http://www.openwall.com/lists/oss-security/2021/12/14/5"
},
{
"source": "support@hackerone.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://benjamin-bouchet.com/cve-2021-22881-faille-de-securite-dans-le-middleware-hostauthorization/"
},
{
"source": "support@hackerone.com",
"tags": [
"Mitigation",
"Patch",
"Vendor Advisory"
],
"url": "https://discuss.rubyonrails.org/t/cve-2021-22881-possible-open-redirect-in-host-authorization-middleware/77130"
},
{
"source": "support@hackerone.com",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://hackerone.com/reports/1047447"
},
{
"source": "support@hackerone.com",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XQ3NS4IBYE2I3MVMGAHFZBZBIZGHXHT3/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Mitigation",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2021/05/05/2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Mitigation",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2021/08/20/1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Mailing List",
"Patch"
],
"url": "http://www.openwall.com/lists/oss-security/2021/12/14/5"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://benjamin-bouchet.com/cve-2021-22881-faille-de-securite-dans-le-middleware-hostauthorization/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mitigation",
"Patch",
"Vendor Advisory"
],
"url": "https://discuss.rubyonrails.org/t/cve-2021-22881-possible-open-redirect-in-host-authorization-middleware/77130"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://hackerone.com/reports/1047447"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XQ3NS4IBYE2I3MVMGAHFZBZBIZGHXHT3/"
}
],
"sourceIdentifier": "support@hackerone.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-601"
}
],
"source": "support@hackerone.com",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-601"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GHSA-8877-PRQ4-9XFW
Vulnerability from github – Published: 2021-03-02 03:44 – Updated: 2023-07-03 22:06
VLAI?
Summary
Actionpack Open Redirect Vulnerability
Details
The Host Authorization middleware in Action Pack before 6.1.2.1, 6.0.3.5 suffers from an open redirect vulnerability. Specially crafted Host headers in combination with certain "allowed host" formats can cause the Host Authorization middleware in Action Pack to redirect users to a malicious website.
Severity ?
6.1 (Medium)
{
"affected": [
{
"database_specific": {
"last_known_affected_version_range": "\u003c= 6.0.3.4"
},
"package": {
"ecosystem": "RubyGems",
"name": "actionpack"
},
"ranges": [
{
"events": [
{
"introduced": "6.0.0"
},
{
"fixed": "6.0.3.5"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"database_specific": {
"last_known_affected_version_range": "\u003c= 6.1.2.0"
},
"package": {
"ecosystem": "RubyGems",
"name": "actionpack"
},
"ranges": [
{
"events": [
{
"introduced": "6.1.0"
},
{
"fixed": "6.1.2.1"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2021-22881"
],
"database_specific": {
"cwe_ids": [
"CWE-601"
],
"github_reviewed": true,
"github_reviewed_at": "2021-03-02T03:44:04Z",
"nvd_published_at": "2021-02-11T18:15:00Z",
"severity": "MODERATE"
},
"details": "The Host Authorization middleware in Action Pack before 6.1.2.1, 6.0.3.5 suffers from an open redirect vulnerability. Specially crafted `Host` headers in combination with certain \"allowed host\" formats can cause the Host Authorization middleware in Action Pack to redirect users to a malicious website. ",
"id": "GHSA-8877-prq4-9xfw",
"modified": "2023-07-03T22:06:02Z",
"published": "2021-03-02T03:44:17Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22881"
},
{
"type": "WEB",
"url": "https://github.com/rails/rails/commit/b5de7b3a4787d8a55aaad39f477c16e3af65e444"
},
{
"type": "WEB",
"url": "https://hackerone.com/reports/1047447"
},
{
"type": "WEB",
"url": "https://benjamin-bouchet.com/cve-2021-22881-faille-de-securite-dans-le-middleware-hostauthorization"
},
{
"type": "WEB",
"url": "https://discuss.rubyonrails.org/t/cve-2021-22881-possible-open-redirect-in-host-authorization-middleware/77130"
},
{
"type": "WEB",
"url": "https://github.com/rails/rails"
},
{
"type": "WEB",
"url": "https://github.com/rails/rails/blob/v6.1.2.1/actionpack/CHANGELOG.md"
},
{
"type": "WEB",
"url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2021-22881.yml"
},
{
"type": "WEB",
"url": "https://groups.google.com/g/rubyonrails-security/c/zN_3qA26l6E"
},
{
"type": "WEB",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XQ3NS4IBYE2I3MVMGAHFZBZBIZGHXHT3"
},
{
"type": "WEB",
"url": "https://rubygems.org/gems/actionpack"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2021/05/05/2"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2021/08/20/1"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2021/12/14/5"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"type": "CVSS_V3"
}
],
"summary": "Actionpack Open Redirect Vulnerability "
}
GSD-2021-22881
Vulnerability from gsd - Updated: 2021-02-10 00:00Details
There is a possible open redirect vulnerability in the Host Authorization
middleware in Action Pack. This vulnerability has been assigned the CVE
identifier CVE-2021-22881.
Versions Affected: >= 6.0.0
Not affected: < 6.0.0
Fixed Versions: 6.1.2.1, 6.0.3.5
Impact
------
Specially crafted "Host" headers in combination with certain "allowed host"
formats can cause the Host Authorization middleware in Action Pack to redirect
users to a malicious website.
Impacted applications will have allowed hosts with a leading dot. For
example, configuration files that look like this:
```
config.hosts << '.tkte.ch'
```
When an allowed host contains a leading dot, a specially crafted Host header
can be used to redirect to a malicious website.
Workarounds
-----------
In the case a patch can't be applied, the following monkey patch can be used
in an initializer:
```ruby
module ActionDispatch
class HostAuthorization
private
def authorized?(request)
valid_host = /
\A
(?<host>[a-z0-9.-]+|\[[a-f0-9]*:[a-f0-9\.:]+\])
(:\d+)?
\z
/x
origin_host = valid_host.match(
request.get_header("HTTP_HOST").to_s.downcase)
forwarded_host = valid_host.match(
request.x_forwarded_host.to_s.split(/,\s?/).last)
origin_host && @permissions.allows?(origin_host[:host]) && (
forwarded_host.nil? || @permissions.allows?(forwarded_host[:host]))
end
end
end
```
Aliases
Aliases
{
"GSD": {
"alias": "CVE-2021-22881",
"description": "The Host Authorization middleware in Action Pack before 6.1.2.1, 6.0.3.5 suffers from an open redirect vulnerability. Specially crafted `Host` headers in combination with certain \"allowed host\" formats can cause the Host Authorization middleware in Action Pack to redirect users to a malicious website. Impacted applications will have allowed hosts with a leading dot. When an allowed host contains a leading dot, a specially crafted `Host` header can be used to redirect to a malicious website.",
"id": "GSD-2021-22881",
"references": [
"https://www.suse.com/security/cve/CVE-2021-22881.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"affected": [
{
"package": {
"ecosystem": "RubyGems",
"name": "actionpack",
"purl": "pkg:gem/actionpack"
}
}
],
"aliases": [
"CVE-2021-22881",
"GHSA-8877-prq4-9xfw"
],
"details": "There is a possible open redirect vulnerability in the Host Authorization\nmiddleware in Action Pack. This vulnerability has been assigned the CVE\nidentifier CVE-2021-22881.\n\nVersions Affected: \u003e= 6.0.0\nNot affected: \u003c 6.0.0\nFixed Versions: 6.1.2.1, 6.0.3.5\n\nImpact\n------\nSpecially crafted \"Host\" headers in combination with certain \"allowed host\"\nformats can cause the Host Authorization middleware in Action Pack to redirect\nusers to a malicious website.\n\nImpacted applications will have allowed hosts with a leading dot. For\nexample, configuration files that look like this:\n\n```\nconfig.hosts \u003c\u003c \u0027.tkte.ch\u0027\n```\n\nWhen an allowed host contains a leading dot, a specially crafted Host header\ncan be used to redirect to a malicious website.\n\nWorkarounds\n-----------\nIn the case a patch can\u0027t be applied, the following monkey patch can be used\nin an initializer:\n\n```ruby\nmodule ActionDispatch\n class HostAuthorization\n private\n def authorized?(request)\n valid_host = /\n \\A\n (?\u003chost\u003e[a-z0-9.-]+|\\[[a-f0-9]*:[a-f0-9\\.:]+\\])\n (:\\d+)?\n \\z\n /x\n\n origin_host = valid_host.match(\n request.get_header(\"HTTP_HOST\").to_s.downcase)\n forwarded_host = valid_host.match(\n request.x_forwarded_host.to_s.split(/,\\s?/).last)\n\n origin_host \u0026\u0026 @permissions.allows?(origin_host[:host]) \u0026\u0026 (\n forwarded_host.nil? || @permissions.allows?(forwarded_host[:host]))\n end\n end\nend\n```\n",
"id": "GSD-2021-22881",
"modified": "2021-02-10T00:00:00.000Z",
"published": "2021-02-10T00:00:00.000Z",
"references": [
{
"type": "WEB",
"url": "https://groups.google.com/g/rubyonrails-security/c/zN_3qA26l6E"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": 6.1,
"type": "CVSS_V3"
}
],
"summary": "Possible Open Redirect in Host Authorization Middleware"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "support@hackerone.com",
"ID": "CVE-2021-22881",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "https://github.com/rails/rails",
"version": {
"version_data": [
{
"version_value": "Fixed in 6.1.2.1, 6.0.3.5"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The Host Authorization middleware in Action Pack before 6.1.2.1, 6.0.3.5 suffers from an open redirect vulnerability. Specially crafted `Host` headers in combination with certain \"allowed host\" formats can cause the Host Authorization middleware in Action Pack to redirect users to a malicious website. Impacted applications will have allowed hosts with a leading dot. When an allowed host contains a leading dot, a specially crafted `Host` header can be used to redirect to a malicious website."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Open Redirect (CWE-601)"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://hackerone.com/reports/1047447",
"refsource": "MISC",
"url": "https://hackerone.com/reports/1047447"
},
{
"name": "https://discuss.rubyonrails.org/t/cve-2021-22881-possible-open-redirect-in-host-authorization-middleware/77130",
"refsource": "MISC",
"url": "https://discuss.rubyonrails.org/t/cve-2021-22881-possible-open-redirect-in-host-authorization-middleware/77130"
},
{
"name": "https://benjamin-bouchet.com/cve-2021-22881-faille-de-securite-dans-le-middleware-hostauthorization/",
"refsource": "MISC",
"url": "https://benjamin-bouchet.com/cve-2021-22881-faille-de-securite-dans-le-middleware-hostauthorization/"
},
{
"name": "FEDORA-2021-b571fca1b8",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XQ3NS4IBYE2I3MVMGAHFZBZBIZGHXHT3/"
},
{
"name": "[oss-security] 20210505 [CVE-2021-22903] Possible Open Redirect Vulnerability in Action Pack",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2021/05/05/2"
},
{
"name": "[oss-security] 20210819 [CVE-2021-22942] Possible Open Redirect in Host Authorization Middleware",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2021/08/20/1"
},
{
"name": "[oss-security] 20211214 [CVE-2021-44528] Possible Open Redirect in Host Authorization Middleware",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2021/12/14/5"
}
]
}
},
"github.com/rubysec/ruby-advisory-db": {
"cve": "2021-22881",
"cvss_v3": 6.1,
"date": "2021-02-10",
"description": "There is a possible open redirect vulnerability in the Host Authorization\nmiddleware in Action Pack. This vulnerability has been assigned the CVE\nidentifier CVE-2021-22881.\n\nVersions Affected: \u003e= 6.0.0\nNot affected: \u003c 6.0.0\nFixed Versions: 6.1.2.1, 6.0.3.5\n\nImpact\n------\nSpecially crafted \"Host\" headers in combination with certain \"allowed host\"\nformats can cause the Host Authorization middleware in Action Pack to redirect\nusers to a malicious website.\n\nImpacted applications will have allowed hosts with a leading dot. For\nexample, configuration files that look like this:\n\n```\nconfig.hosts \u003c\u003c \u0027.tkte.ch\u0027\n```\n\nWhen an allowed host contains a leading dot, a specially crafted Host header\ncan be used to redirect to a malicious website.\n\nWorkarounds\n-----------\nIn the case a patch can\u0027t be applied, the following monkey patch can be used\nin an initializer:\n\n```ruby\nmodule ActionDispatch\n class HostAuthorization\n private\n def authorized?(request)\n valid_host = /\n \\A\n (?\u003chost\u003e[a-z0-9.-]+|\\[[a-f0-9]*:[a-f0-9\\.:]+\\])\n (:\\d+)?\n \\z\n /x\n\n origin_host = valid_host.match(\n request.get_header(\"HTTP_HOST\").to_s.downcase)\n forwarded_host = valid_host.match(\n request.x_forwarded_host.to_s.split(/,\\s?/).last)\n\n origin_host \u0026\u0026 @permissions.allows?(origin_host[:host]) \u0026\u0026 (\n forwarded_host.nil? || @permissions.allows?(forwarded_host[:host]))\n end\n end\nend\n```\n",
"framework": "rails",
"gem": "actionpack",
"ghsa": "8877-prq4-9xfw",
"patched_versions": [
"~\u003e 6.0.3, \u003e= 6.0.3.5",
"\u003e= 6.1.2.1"
],
"title": "Possible Open Redirect in Host Authorization Middleware",
"unaffected_versions": [
"\u003c 6.0.0"
],
"url": "https://groups.google.com/g/rubyonrails-security/c/zN_3qA26l6E"
},
"gitlab.com": {
"advisories": [
{
"affected_range": "\u003e=6.0.0 \u003c6.0.3.5||\u003e=6.1.0 \u003c6.1.2.1||=33",
"affected_versions": "All versions starting from 6.0.0 before 6.0.3.5, all versions starting from 6.1.0 before 6.1.2.1, version 33",
"cvss_v2": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
"cvss_v3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"cwe_ids": [
"CWE-1035",
"CWE-601",
"CWE-937"
],
"date": "2021-09-21",
"description": "The Host Authorization middleware in Action Pack suffers from an open redirect vulnerability. Specially crafted `Host` headers in combination with certain \"allowed host\" formats can cause the Host Authorization middleware in Action Pack to redirect users to a malicious website. Impacted applications will have allowed hosts with a leading dot. When an allowed host contains a leading dot, a specially crafted `Host` header can be used to redirect to a malicious website.",
"fixed_versions": [
"6.0.3.5",
"6.1.2.1"
],
"identifier": "CVE-2021-22881",
"identifiers": [
"CVE-2021-22881"
],
"not_impacted": "All versions before 6.0.0, all versions starting from 6.0.3.5 before 6.1.0, all versions starting from 6.1.2.1 before 33, all versions after 33",
"package_slug": "gem/actionpack",
"pubdate": "2021-02-11",
"solution": "Upgrade to versions 6.0.3.5, 6.1.2.1 or above.",
"title": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)",
"urls": [
"https://nvd.nist.gov/vuln/detail/CVE-2021-22881"
],
"uuid": "b6b7cac1-ed1c-448d-921f-79262ac7d9e4"
},
{
"affected_range": "\u003e=6.0.0 \u003c6.0.3.5||\u003e=6.1.0 \u003c6.1.2.1",
"affected_versions": "All versions starting from 6.0.0 before 6.0.3.5, all versions starting from 6.1.0 before 6.1.2.1",
"cvss_v2": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
"cvss_v3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"cwe_ids": [
"CWE-1035",
"CWE-601",
"CWE-937"
],
"date": "2022-01-04",
"description": "The Host Authorization middleware in Action Pack suffers from an open redirect vulnerability. Specially crafted `Host` headers in combination with certain \"allowed host\" formats can cause the Host Authorization middleware in Action Pack to redirect users to a malicious website. Impacted applications will have allowed hosts with a leading dot. When an allowed host contains a leading dot, a specially crafted `Host` header can be used to redirect to a malicious website.",
"fixed_versions": [
"6.0.3.5",
"6.1.2.1"
],
"identifier": "CVE-2021-22881",
"identifiers": [
"CVE-2021-22881"
],
"not_impacted": "All versions before 6.0.0, all versions starting from 6.0.3.5 before 6.1.0, all versions starting from 6.1.2.1",
"package_slug": "gem/rails",
"pubdate": "2021-02-11",
"solution": "Upgrade to versions 6.0.3.5, 6.1.2.1 or above.",
"title": "URL Redirection to Untrusted Site (Open Redirect)",
"urls": [
"https://nvd.nist.gov/vuln/detail/CVE-2021-22881",
"https://discuss.rubyonrails.org/t/cve-2021-22881-possible-open-redirect-in-host-authorization-middleware/77130"
],
"uuid": "155d2c71-7cce-497d-97e0-82f2c90e1e54"
}
]
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:rubyonrails:rails:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "6.0.3.5",
"versionStartIncluding": "6.0.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rubyonrails:rails:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "6.1.2.1",
"versionStartIncluding": "6.1.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "cve-assignments@hackerone.com",
"ID": "CVE-2021-22881"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "The Host Authorization middleware in Action Pack before 6.1.2.1, 6.0.3.5 suffers from an open redirect vulnerability. Specially crafted `Host` headers in combination with certain \"allowed host\" formats can cause the Host Authorization middleware in Action Pack to redirect users to a malicious website. Impacted applications will have allowed hosts with a leading dot. When an allowed host contains a leading dot, a specially crafted `Host` header can be used to redirect to a malicious website."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-601"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://hackerone.com/reports/1047447",
"refsource": "MISC",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://hackerone.com/reports/1047447"
},
{
"name": "https://discuss.rubyonrails.org/t/cve-2021-22881-possible-open-redirect-in-host-authorization-middleware/77130",
"refsource": "MISC",
"tags": [
"Mitigation",
"Patch",
"Vendor Advisory"
],
"url": "https://discuss.rubyonrails.org/t/cve-2021-22881-possible-open-redirect-in-host-authorization-middleware/77130"
},
{
"name": "https://benjamin-bouchet.com/cve-2021-22881-faille-de-securite-dans-le-middleware-hostauthorization/",
"refsource": "MISC",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://benjamin-bouchet.com/cve-2021-22881-faille-de-securite-dans-le-middleware-hostauthorization/"
},
{
"name": "FEDORA-2021-b571fca1b8",
"refsource": "FEDORA",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XQ3NS4IBYE2I3MVMGAHFZBZBIZGHXHT3/"
},
{
"name": "[oss-security] 20210505 [CVE-2021-22903] Possible Open Redirect Vulnerability in Action Pack",
"refsource": "MLIST",
"tags": [
"Mailing List",
"Mitigation",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2021/05/05/2"
},
{
"name": "[oss-security] 20210819 [CVE-2021-22942] Possible Open Redirect in Host Authorization Middleware",
"refsource": "MLIST",
"tags": [
"Mailing List",
"Mitigation",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2021/08/20/1"
},
{
"name": "[oss-security] 20211214 [CVE-2021-44528] Possible Open Redirect in Host Authorization Middleware",
"refsource": "MLIST",
"tags": [
"Exploit",
"Mailing List",
"Patch"
],
"url": "http://www.openwall.com/lists/oss-security/2021/12/14/5"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 4.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": true
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
},
"lastModifiedDate": "2022-01-04T16:38Z",
"publishedDate": "2021-02-11T18:15Z"
}
}
}
CERTFR-2021-AVI-115
Vulnerability from certfr_avis - Published: 2021-02-11 - Updated: 2021-02-11
De multiples vulnérabilités ont été découvertes dans Ruby on Rails. Elles permettent à un attaquant de provoquer un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneImpacted products
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Ruby on Rails | Ruby on Rails | Ruby on Rails versions 4.2.0 à 5.2.x antérieures à 5.2.4.5 | ||
| Ruby on Rails | Ruby on Rails | Ruby on Rails versions 6.0 antérieures à 6.0.3.5 | ||
| Ruby on Rails | Ruby on Rails | Ruby on Rails versions 6.1 antérieures à 6.1.2.1 |
References
| Title | Publication Time | Tags | |
|---|---|---|---|
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Ruby on Rails versions 4.2.0 \u00e0 5.2.x ant\u00e9rieures \u00e0 5.2.4.5",
"product": {
"name": "Ruby on Rails",
"vendor": {
"name": "Ruby on Rails",
"scada": false
}
}
},
{
"description": "Ruby on Rails versions 6.0 ant\u00e9rieures \u00e0 6.0.3.5",
"product": {
"name": "Ruby on Rails",
"vendor": {
"name": "Ruby on Rails",
"scada": false
}
}
},
{
"description": "Ruby on Rails versions 6.1 ant\u00e9rieures \u00e0 6.1.2.1",
"product": {
"name": "Ruby on Rails",
"vendor": {
"name": "Ruby on Rails",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-22880",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22880"
},
{
"name": "CVE-2021-22881",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22881"
}
],
"initial_release_date": "2021-02-11T00:00:00",
"last_revision_date": "2021-02-11T00:00:00",
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 Ruby on Rails du 11 f\u00e9vrier 2021",
"url": "https://groups.google.com/g/rubyonrails-security/c/zN_3qA26l6E"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Ruby on Rails du 11 f\u00e9vrier 2021",
"url": "https://groups.google.com/g/rubyonrails-security/c/ZzUqCh9vyhI"
}
],
"reference": "CERTFR-2021-AVI-115",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-02-11T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Ruby on Rails.\nElles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0\ndistance et un contournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Ruby on Rails",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ruby on Rails du 11 f\u00e9vrier 2021",
"url": null
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…