The actionpack ruby gem before 6.1.3.2 suffers from a possible open redirect vulnerability. Specially crafted Host headers in combination with certain "allowed host" formats can cause the Host Authorization middleware in Action Pack to redirect users to a malicious website. This is similar to CVE-2021-22881. Strings in config.hosts that do not have a leading dot are converted to regular expressions without proper escaping. This causes, for example, `config.hosts << "sub.example.com"` to permit a request with a Host header value of `sub-example.com`.
Advisories
Source ID Title
EUVD EUVD EUVD-2021-0957 The actionpack ruby gem before 6.1.3.2 suffers from a possible open redirect vulnerability. Specially crafted Host headers in combination with certain "allowed host" formats can cause the Host Authorization middleware in Action Pack to redirect users to a malicious website. This is similar to CVE-2021-22881. Strings in config.hosts that do not have a leading dot are converted to regular expressions without proper escaping. This causes, for example, `config.hosts << "sub.example.com"` to permit a request with a Host header value of `sub-example.com`.
Github GHSA Github GHSA GHSA-5hq2-xf89-9jxq Possible Open Redirect Vulnerability in Action Pack
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: hackerone

Published:

Updated: 2024-08-03T18:58:25.786Z

Reserved: 2021-01-06T00:00:00

Link: CVE-2021-22903

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-06-11T16:15:11.437

Modified: 2024-11-21T05:50:52.903

Link: CVE-2021-22903

cve-icon Redhat

Severity : Low

Publid Date: 2021-05-05T00:00:00Z

Links: CVE-2021-22903 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses