• 公告ID (KylinSec-SA-2021-1919)

摘要:

The actionpack ruby gem before 6.1.3.2 suffers from a possible open redirect vulnerability. Specially crafted Host headers in combination with certain allowed host formats can cause the Host Authorization middleware in Action Pack to redirect users to a malicious website. This is similar to CVE-2021-22881. Strings in config.hosts that do not have a leading dot are converted to regular expressions without proper escaping. This causes, for example, `config.hosts << sub.example.com ` to permit a request with a Host header value of `sub-example.com`.

安全等级: Low

公告ID: KylinSec-SA-2021-1919

发布日期: 2021年7月28日

关联CVE: CVE-2021-22903  

  • 详细介绍

1. 漏洞描述

   

The actionpack ruby gem before 6.1.3.2 suffers from a possible open redirect vulnerability. Specially crafted Host headers in combination with certain allowed host formats can cause the Host Authorization middleware in Action Pack to redirect users to a malicious website. This is similar to CVE-2021-22881. Strings in config.hosts that do not have a leading dot are converted to regular expressions without proper escaping. This causes, for example, `config.hosts << sub.example.com ` to permit a request with a Host header value of `sub-example.com`.

2. 影响范围

cve名称 产品 组件 是否受影响
CVE-2021-22903 KY3.4-4A rubygem-actionpack Unaffected

3. 影响组件

    无

4. 修复版本

    无

5. 修复方法

   无

6. 下载链接

    无
上一篇:KylinSec-SA-2021-1914 下一篇:KylinSec-SA-2021-1923