First published: Thu Feb 11 2021(Updated: )
The Host Authorization middleware in Action Pack before 6.1.2.1, 6.0.3.5 suffers from an open redirect vulnerability. Specially crafted `Host` headers in combination with certain "allowed host" formats can cause the Host Authorization middleware in Action Pack to redirect users to a malicious website. Impacted applications will have allowed hosts with a leading dot. When an allowed host contains a leading dot, a specially crafted `Host` header can be used to redirect to a malicious website.
Credit: support@hackerone.com
Affected Software | Affected Version | How to fix |
---|---|---|
Rubyonrails Rails | >=6.0.0<6.0.3.5 | |
Rubyonrails Rails | >=6.1.0<6.1.2.1 | |
Fedoraproject Fedora | =33 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-22881 is an open redirect vulnerability in the Host Authorization middleware in Ruby on Rails before version 6.1.2.1 and 6.0.3.5.
CVE-2021-22881 has a severity rating of 6.1, which is considered medium.
Ruby on Rails versions before 6.1.2.1 and 6.0.3.5 are affected by CVE-2021-22881.
CVE-2021-22881 can be exploited by sending specially crafted `Host` headers to the vulnerable application, which can lead to an open redirect and redirect users to a malicious website.
Yes, upgrading to Ruby on Rails version 6.1.2.1 or 6.0.3.5 will fix the vulnerability.