rails:sid is vulnerable to open redirect. The Host Authorization middleware is vulnerable because it allows specially crafted Host
headers in combination with certain “allowed host” formats to cause the Host Authorization middleware in Action Pack to redirect users to a malicious website. Impacted applications will have allowed hosts with a leading dot. When an allowed host contains a leading dot, a specially crafted Host
header can be used to redirect to a malicious website.
www.openwall.com/lists/oss-security/2021/05/05/2
www.openwall.com/lists/oss-security/2021/08/20/1
www.openwall.com/lists/oss-security/2021/12/14/5
benjamin-bouchet.com/cve-2021-22881-faille-de-securite-dans-le-middleware-hostauthorization/
discuss.rubyonrails.org/t/cve-2021-22881-possible-open-redirect-in-host-authorization-middleware/77130
hackerone.com/reports/1047447
lists.fedoraproject.org/archives/list/[email protected]/message/XQ3NS4IBYE2I3MVMGAHFZBZBIZGHXHT3/
security-tracker.debian.org/tracker/CVE-2021-22881