Lucene search

K
ubuntucveUbuntu.comUB:CVE-2021-22881
HistoryFeb 11, 2021 - 12:00 a.m.

CVE-2021-22881

2021-02-1100:00:00
ubuntu.com
ubuntu.com
8
cve-2021-22881
open redirect vulnerability
action pack
host authorization middleware
specially crafted host headers
allowed host format
malicious website
leading dot
transition

CVSS2

5.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:P/A:N

CVSS3

6.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

EPSS

0.002

Percentile

61.0%

The Host Authorization middleware in Action Pack before 6.1.2.1, 6.0.3.5
suffers from an open redirect vulnerability. Specially crafted Host
headers in combination with certain “allowed host” formats can cause the
Host Authorization middleware in Action Pack to redirect users to a
malicious website. Impacted applications will have allowed hosts with a
leading dot. When an allowed host contains a leading dot, a specially
crafted Host header can be used to redirect to a malicious website.

Notes

Author Note
seth-arnold In Oneiric-Saucy, rails package is just for transition; The rails package contains actual code from vivid onward

CVSS2

5.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:P/A:N

CVSS3

6.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

EPSS

0.002

Percentile

61.0%