The cgi gem before 0.1.0.2, 0.2.x before 0.2.2, and 0.3.x before 0.3.5 for Ruby allows HTTP response splitting. This is relevant to applications that use untrusted user input either to generate an HTTP response or to create a CGI::Cookie object.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
21 Nov 2024, 06:09
Type | Values Removed | Values Added |
---|---|---|
References | () https://lists.debian.org/debian-lts-announce/2023/06/msg00012.html - | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DQR7LWED6VAPD5ATYOBZIGJQPCUBRJBX/ - | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/THVTYHHEOVLQFCFHWURZYO7PVUPBHRZD/ - | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YACE6ORF2QBXXBK2V2CM36D7TZMEJVAS/ - | |
References | () https://security.gentoo.org/glsa/202401-27 - | |
References | () https://security.netapp.com/advisory/ntap-20221228-0004/ - Third Party Advisory | |
References | () https://www.ruby-lang.org/en/news/2022/11/22/http-response-splitting-in-cgi-cve-2021-33621/ - Exploit, Third Party Advisory |
24 Jan 2024, 05:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
07 Nov 2023, 03:35
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
08 Aug 2023, 14:21
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-74 |
09 Jun 2023, 13:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
Information
Published : 2022-11-18 23:15
Updated : 2024-11-21 06:09
NVD link : CVE-2021-33621
Mitre link : CVE-2021-33621
CVE.ORG link : CVE-2021-33621
JSON object : View
Products Affected
ruby-lang
- cgi
- ruby
fedoraproject
- fedora
CWE
CWE-74
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')