First published: Wed May 05 2021(Updated: )
The actionpack ruby gem before 6.1.3.2 suffers from a possible open redirect vulnerability. Specially crafted Host headers in combination with certain "allowed host" formats can cause the Host Authorization middleware in Action Pack to redirect users to a malicious website. This is similar to CVE-2021-22881. Strings in config.hosts that do not have a leading dot are converted to regular expressions without proper escaping. This causes, for example, `config.hosts << "sub.example.com"` to permit a request with a Host header value of `sub-example.com`.
Credit: support@hackerone.com
Affected Software | Affected Version | How to fix |
---|---|---|
rubygems/actionpack | >=6.1.0.rc2<6.1.3.2 | 6.1.3.2 |
Ruby on Rails | >=6.1.1<6.1.3.2 | |
Ruby on Rails | =6.1.0-rc2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-22903 is a possible open redirect vulnerability in Action Pack, a Ruby gem used in Ruby on Rails applications.
Action Pack versions >= v6.1.0.rc2 are affected by CVE-2021-22903.
To fix CVE-2021-22903, you should upgrade to Action Pack version 6.1.3.2 or later.
CVE-2021-22903 allows for possible open redirects, potentially leading to phishing attacks or unauthorized access to sensitive information.
You can find more information about CVE-2021-22903 on the GitHub release page, the Ruby on Rails security group on Google Groups, and the NVD (National Vulnerability Database) website.