8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
0.004 Low
EPSS
Percentile
74.8%
The cgi gem before 0.1.0.2, 0.2.x before 0.2.2, and 0.3.x before 0.3.5 for
Ruby allows HTTP response splitting. This is relevant to applications that
use untrusted user input either to generate an HTTP response or to create a
CGI::Cookie object.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 18.04 | noarch | jruby | < any | UNKNOWN |
ubuntu | 20.04 | noarch | jruby | < any | UNKNOWN |
ubuntu | 23.10 | noarch | jruby | < any | UNKNOWN |
ubuntu | 24.04 | noarch | jruby | < any | UNKNOWN |
ubuntu | 14.04 | noarch | jruby | < any | UNKNOWN |
ubuntu | 16.04 | noarch | jruby | < any | UNKNOWN |
ubuntu | 16.04 | noarch | ruby2.3 | < 2.3.1-2~ubuntu16.04.16+esm4 | UNKNOWN |
ubuntu | 18.04 | noarch | ruby2.5 | < 2.5.1-1ubuntu1.13 | UNKNOWN |
ubuntu | 20.04 | noarch | ruby2.7 | < 2.7.0-5ubuntu1.8 | UNKNOWN |
ubuntu | 22.04 | noarch | ruby3.0 | < 3.0.2-7ubuntu2.3 | UNKNOWN |
github.com/ruby/cgi/commit/64c5045c0a6b84fdb938a8465a0890e5f7162708
github.com/ruby/cgi/commit/b46d41c36380e04f6388970b5ef05c687f4d1819
launchpad.net/bugs/cve/CVE-2021-33621
nvd.nist.gov/vuln/detail/CVE-2021-33621
security-tracker.debian.org/tracker/CVE-2021-33621
ubuntu.com/security/notices/USN-5806-1
ubuntu.com/security/notices/USN-5806-2
ubuntu.com/security/notices/USN-5806-3
ubuntu.com/security/notices/USN-6181-1
www.cve.org/CVERecord?id=CVE-2021-33621
www.ruby-lang.org/en/news/2022/11/22/http-response-splitting-in-cgi-cve-2021-33621/