A open redirect vulnerability exists in Action Pack >= 6.0.0 that could allow an attacker to craft a "X-Forwarded-Host" headers in combination with certain "allowed host" formats can cause the Host Authorization middleware in Action Pack to redirect users to a malicious website.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 06:31
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/rails/rails/commit/0fccfb9a3097a9c4260c791f1a40b128517e7815 - Patch, Third Party Advisory | |
References | () https://security.netapp.com/advisory/ntap-20240208-0003/ - | |
References | () https://www.debian.org/security/2023/dsa-5372 - |
08 Feb 2024, 10:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
Information
Published : 2022-01-10 14:10
Updated : 2024-11-21 06:31
NVD link : CVE-2021-44528
Mitre link : CVE-2021-44528
CVE.ORG link : CVE-2021-44528
JSON object : View
Products Affected
rubyonrails
- rails
CWE
CWE-601
URL Redirection to Untrusted Site ('Open Redirect')