HomeRubyonrailsCVE-2021-22881

CVE-2021-22881

MEDIUM
6.1CVSS
Published: 2021-02-11
Updated: 2024-11-21
AI Analysis

Description

The Host Authorization middleware in Action Pack before 6.1.2.1, 6.0.3.5 suffers from an open redirect vulnerability. Specially crafted `Host` headers in combination with certain "allowed host" formats can cause the Host Authorization middleware in Action Pack to redirect users to a malicious website. Impacted applications will have allowed hosts with a leading dot. When an allowed host contains a leading dot, a specially crafted `Host` header can be used to redirect to a malicious website.

CVSS Metrics

Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Attack Vector
network
Complexity
low
Privileges
none
User Action
required
Scope
changed
Confidentiality
low
Integrity
low
Availability
none
Weaknesses
CWE-601CWE-601

Metadata

Primary Vendor
RUBYONRAILS
Published
2/11/2021
Last Modified
11/21/2024
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

rubyonrails : railsrubyonrails : railsfedoraproject : fedora

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief

CVE-CVE-2021-22881 | MEDIUM Severity | CVEDatabase.com | CVEDatabase.com