vulnerability

FreeBSD: VID-8E670B85-706E-11EB-ABB2-08002728F74C (CVE-2021-22881): Rails -- multiple vulnerabilities

Severity
6
CVSS
(AV:N/AC:M/Au:N/C:P/I:P/A:N)
Published
Feb 10, 2021
Added
Feb 18, 2021
Modified
Feb 18, 2021

Description

The Host Authorization middleware in Action Pack before 6.1.2.1, 6.0.3.5 suffers from an open redirect vulnerability. Specially crafted `Host` headers in combination with certain "allowed host" formats can cause the Host Authorization middleware in Action Pack to redirect users to a malicious website. Impacted applications will have allowed hosts with a leading dot. When an allowed host contains a leading dot, a specially crafted `Host` header can be used to redirect to a malicious website.

Solution(s)

freebsd-upgrade-package-rubygem-actionpack60freebsd-upgrade-package-rubygem-actionpack61freebsd-upgrade-package-rubygem-activerecord52freebsd-upgrade-package-rubygem-activerecord60freebsd-upgrade-package-rubygem-activerecord61
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.