First published: Mon Mar 03 2025(Updated: )
In the URI gem before 1.0.3 for Ruby, the URI handling methods (URI.join, URI#merge, URI#+) have an inadvertent leakage of authentication credentials because userinfo is retained even after changing the host.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
rubygems/uri | >=1.0.0<1.0.3 | 1.0.3 |
rubygems/uri | >=0.13.0<0.13.2 | 0.13.2 |
rubygems/uri | >=0.12.0<0.12.4 | 0.12.4 |
rubygems/uri | <0.11.3 | 0.11.3 |
Tal Url Ruby | <0.11.3 | |
Tal Url Ruby | >=0.12.0<0.12.4 | |
Tal Url Ruby | >=0.13.0<0.13.2 | |
Tal Url Ruby | >=1.0.0<1.0.3 | |
debian/ruby2.7 | <=2.7.4-1+deb11u1 | 2.7.4-1+deb11u5 |
debian/ruby3.1 | <=3.1.2-7+deb12u1 | |
debian/ruby3.3 | 3.3.8-1 | |
debian/rubygems | <=3.2.5-2<=3.3.15-2 | 3.6.7-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-27221 poses a risk of userinfo leakage, which can lead to unauthorized access to sensitive information.
To remediate CVE-2025-27221, upgrade the uri gem to version 1.0.3, 0.13.2, 0.12.4, or 0.11.3 as applicable.
CVE-2025-27221 can lead to leaking sensitive user credentials, compromising user privacy and security.
CVE-2025-27221 affects versions of the uri gem prior to 1.0.3, 0.13.2, 0.12.4, and 0.11.3.
No specific workarounds are recommended for CVE-2025-27221; upgrading to the fixed versions is the only effective solution.