ruby is vulnerable to http response splitting. The vulnerability exists when applications use untrusted user input either to generate an HTTP response or to create a cgi cookie object.
bugzilla.suse.com/show_bug.cgi?id=1205726
github.com/ruby/cgi/commit/35317005f853112295de8b8bd99643e66dff4e33
github.com/ruby/cgi/commit/64c5045c0a6b84fdb938a8465a0890e5f7162708
github.com/ruby/cgi/commit/85e22c30b4e410d1dc57f21160cc24b236b8cdc6
hackerone.com/reports/1204695
lists.debian.org/debian-lts-announce/2023/06/msg00012.html
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DQR7LWED6VAPD5ATYOBZIGJQPCUBRJBX/
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/THVTYHHEOVLQFCFHWURZYO7PVUPBHRZD/
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YACE6ORF2QBXXBK2V2CM36D7TZMEJVAS/
lists.fedoraproject.org/archives/list/[email protected]/message/DQR7LWED6VAPD5ATYOBZIGJQPCUBRJBX/
lists.fedoraproject.org/archives/list/[email protected]/message/THVTYHHEOVLQFCFHWURZYO7PVUPBHRZD/
lists.fedoraproject.org/archives/list/[email protected]/message/YACE6ORF2QBXXBK2V2CM36D7TZMEJVAS/
secdb.alpinelinux.org/edge/main.yaml
secdb.alpinelinux.org/v3.16/main.yaml
secdb.alpinelinux.org/v3.17/main.yaml
security.netapp.com/advisory/ntap-20221228-0004/
www.ruby-lang.org/en/news/2022/11/22/http-response-splitting-in-cgi-cve-2021-33621/