First published: Wed May 05 2021(Updated: )
A possible information disclosure / unintended method execution vulnerability in Action Pack >= 2.0.0 when using the `redirect_to` or `polymorphic_url`helper with untrusted user input.
Credit: support@hackerone.com
Affected Software | Affected Version | How to fix |
---|---|---|
Rubyonrails Rails | >=5.2.0.0<5.2.4.6 | |
Rubyonrails Rails | >=6.0.0.0<6.0.3.7 | |
Rubyonrails Rails | >=6.1.0.0<6.1.3.1 | |
Rubyonrails Actionpack Page-caching | ||
Debian Debian Linux | =10.0 | |
redhat/tfm-rubygem-actionpack | <0:6.0.3.7-1.el7 | 0:6.0.3.7-1.el7 |
debian/rails | 2:5.2.2.1+dfsg-1+deb10u3 2:5.2.2.1+dfsg-1+deb10u5 2:6.0.3.7+dfsg-2+deb11u2 2:6.1.7.3+dfsg-1 2:6.1.7.3+dfsg-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-22885 is a possible information disclosure / unintended method execution vulnerability in Action Pack >= 2.0.
CVE-2021-22885 has a severity value of 7.5, classifying it as high.
CVE-2021-22885 affects rubygem-actionpack versions 5.2.4.6, 6.0.3.7, and 6.1.3.2.
To fix CVE-2021-22885, upgrade to rubygem-actionpack version 6.1.3.2, 6.0.3.7, or 5.2.4.6 depending on the version you are using.
You can find more information about CVE-2021-22885 on the Red Hat Security Advisory page and the Openwall mailing list.