The Host Authorization middleware in Action Pack before 6.1.2.1, 6.0.3.5 suffers from an open redirect vulnerability. Specially crafted Host
headers in combination with certain “allowed host” formats can cause the Host Authorization middleware in Action Pack to redirect users to a malicious website.
www.openwall.com/lists/oss-security/2021/05/05/2
www.openwall.com/lists/oss-security/2021/08/20/1
www.openwall.com/lists/oss-security/2021/12/14/5
benjamin-bouchet.com/cve-2021-22881-faille-de-securite-dans-le-middleware-hostauthorization
discuss.rubyonrails.org/t/cve-2021-22881-possible-open-redirect-in-host-authorization-middleware/77130
github.com/rails/rails
github.com/rails/rails/blob/v6.1.2.1/actionpack/CHANGELOG.md
github.com/rails/rails/commit/b5de7b3a4787d8a55aaad39f477c16e3af65e444
github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2021-22881.yml
groups.google.com/g/rubyonrails-security/c/zN_3qA26l6E
hackerone.com/reports/1047447
lists.fedoraproject.org/archives/list/[email protected]/message/XQ3NS4IBYE2I3MVMGAHFZBZBIZGHXHT3
nvd.nist.gov/vuln/detail/CVE-2021-22881
rubygems.org/gems/actionpack