An open redirect vulnerability is fixed in Rails 7.0.4.1 with the new protection against open redirects from calling redirect_to with untrusted user input. In prior versions the developer was fully responsible for only providing trusted input. However the check introduced could allow an attacker to bypass with a carefully crafted URL resulting in an open redirect vulnerability.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 07:45
Type | Values Removed | Values Added |
---|---|---|
References | () https://discuss.rubyonrails.org/t/cve-2023-22799-possible-redos-based-dos-vulnerability-in-globalid/82127 - Not Applicable |
Information
Published : 2023-02-09 20:15
Updated : 2024-11-21 07:45
NVD link : CVE-2023-22797
Mitre link : CVE-2023-22797
CVE.ORG link : CVE-2023-22797
JSON object : View
Products Affected
rubyonrails
- rails
actionpack_project
- actionpack
CWE
CWE-601
URL Redirection to Untrusted Site ('Open Redirect')