Lucene search

K
ubuntucveUbuntu.comUB:CVE-2021-22903
HistoryJun 11, 2021 - 12:00 a.m.

CVE-2021-22903

2021-06-1100:00:00
ubuntu.com
ubuntu.com
13
actionpack ruby gem
open redirect vulnerability
host authorization middleware
cve-2021-22881
config.hosts
improper escaping

CVSS2

5.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:P/A:N

CVSS3

6.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

EPSS

0.002

Percentile

61.0%

The actionpack ruby gem before 6.1.3.2 suffers from a possible open
redirect vulnerability. Specially crafted Host headers in combination with
certain “allowed host” formats can cause the Host Authorization middleware
in Action Pack to redirect users to a malicious website. This is similar to
CVE-2021-22881. Strings in config.hosts that do not have a leading dot are
converted to regular expressions without proper escaping. This causes, for
example, config.hosts << "sub.example.com" to permit a request with a
Host header value of sub-example.com.

Notes

Author Note
seth-arnold In Oneiric-Saucy, rails package is just for transition; The rails package contains actual code from vivid onward

CVSS2

5.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:P/A:N

CVSS3

6.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

EPSS

0.002

Percentile

61.0%