First published: Fri Nov 18 2022(Updated: )
A vulnerability was found in Ruby that allows HTTP header injection. A CGI application using the CGI library may insert untrusted input into the HTTP response header. This issue can allow an attacker to insert a newline character to split a header and inject malicious content to deceive clients.
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/rh-ruby27-ruby | <0:2.7.8-132.el7 | 0:2.7.8-132.el7 |
Ruby-lang Cgi | <0.1.0.2 | |
Ruby-lang Cgi | >=0.2.0<0.2.2 | |
Ruby-lang Cgi | >=0.3.0<0.3.5 | |
Fedoraproject Fedora | =35 | |
Fedoraproject Fedora | =36 | |
Fedoraproject Fedora | =37 | |
Ruby-lang Ruby | >=2.7.0<2.7.7 | |
Ruby-lang Ruby | >=3.0.0<3.0.5 | |
Ruby-lang Ruby | >=3.1.0<3.1.3 | |
rubygems/cgi | <0.1.0.2 | 0.1.0.2 |
rubygems/cgi | >=0.2.0<0.2.2 | 0.2.2 |
rubygems/cgi | >=0.3.0<0.3.5 | 0.3.5 |
debian/ruby2.7 | <=2.7.4-1+deb11u1 | 2.7.4-1+deb11u3 |
debian/ruby3.1 | 3.1.2-7+deb12u1 3.1.2-8.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for the Ruby gem cgi.rb vulnerability is CVE-2021-33621.
CVE-2021-33621 has a severity rating of 8.8 (High).
Ruby gem cgi.rb versions 0.1.0.2, 0.2.x (up to 0.2.2), and 0.3.x (up to 0.3.5) are affected by CVE-2021-33621.
An attacker can exploit CVE-2021-33621 by inserting untrusted input into the HTTP response header of a CGI application using the CGI library, causing header injection and potentially injecting malicious content.
Yes, remediation steps are available for CVE-2021-33621. Please refer to the references provided for more information.