vulnerability
FreeBSD: VID-8E670B85-706E-11EB-ABB2-08002728F74C (CVE-2021-22881): Rails -- multiple vulnerabilities
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
6 | (AV:N/AC:M/Au:N/C:P/I:P/A:N) | Feb 10, 2021 | Feb 18, 2021 | Feb 18, 2021 |
Severity
6
CVSS
(AV:N/AC:M/Au:N/C:P/I:P/A:N)
Published
Feb 10, 2021
Added
Feb 18, 2021
Modified
Feb 18, 2021
Description
The Host Authorization middleware in Action Pack before 6.1.2.1, 6.0.3.5 suffers from an open redirect vulnerability. Specially crafted `Host` headers in combination with certain "allowed host" formats can cause the Host Authorization middleware in Action Pack to redirect users to a malicious website. Impacted applications will have allowed hosts with a leading dot. When an allowed host contains a leading dot, a specially crafted `Host` header can be used to redirect to a malicious website.
Solution(s)
freebsd-upgrade-package-rubygem-actionpack60freebsd-upgrade-package-rubygem-actionpack61freebsd-upgrade-package-rubygem-activerecord52freebsd-upgrade-package-rubygem-activerecord60freebsd-upgrade-package-rubygem-activerecord61
References

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.