8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
0.004 Low
EPSS
Percentile
74.8%
Hiroshi Tokumaru reports:
If an application that generates HTTP responses using the
cgi gem with untrusted user input, an attacker can exploit
it to inject a malicious HTTP response header and/or body.
Also, the contents for a CGI::Cookie object
were not checked properly. If an application creates a
CGI::Cookie object based on user input, an
attacker may exploit it to inject invalid attributes in
Set-Cookie header. We think such applications
are unlikely, but we have included a change to check
arguments for CGI::Cookie#initialize
preventatively.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
FreeBSD | any | noarch | rubygem-cgi | < 0.3.4 | UNKNOWN |
FreeBSD | any | noarch | ruby | = 2.7.0,1 | UNKNOWN |
FreeBSD | any | noarch | ruby | < 2.7.7,1 | UNKNOWN |
FreeBSD | any | noarch | ruby27 | = 2.7.0,1 | UNKNOWN |
FreeBSD | any | noarch | ruby27 | < 2.7.7,1 | UNKNOWN |
FreeBSD | any | noarch | ruby30 | = 3.0.0,1 | UNKNOWN |
FreeBSD | any | noarch | ruby30 | < 3.0.5,1 | UNKNOWN |
FreeBSD | any | noarch | ruby31 | = 3.1.0,1 | UNKNOWN |
FreeBSD | any | noarch | ruby31 | < 3.1.3,1 | UNKNOWN |
FreeBSD | any | noarch | ruby32 | = 3.2.0.p1,1 | UNKNOWN |
8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
0.004 Low
EPSS
Percentile
74.8%