vulnerability

Red Hat: CVE-2025-27221: uri: userinfo leakage in URI#join, URI#merge and URI#+ (Multiple Advisories)

Severity
1
CVSS
(AV:L/AC:H/Au:N/C:P/I:N/A:N)
Published
Mar 4, 2025
Added
Apr 24, 2025
Modified
May 7, 2025

Description

In the URI gem before 1.0.3 for Ruby, the URI handling methods (URI.join, URI#merge, URI#+) have an inadvertent leakage of authentication credentials because userinfo is retained even after changing the host.

Solution(s)

redhat-upgrade-rubyredhat-upgrade-ruby-bundled-gemsredhat-upgrade-ruby-bundled-gems-debuginforedhat-upgrade-ruby-debuginforedhat-upgrade-ruby-debugsourceredhat-upgrade-ruby-default-gemsredhat-upgrade-ruby-develredhat-upgrade-ruby-docredhat-upgrade-ruby-libsredhat-upgrade-ruby-libs-debuginforedhat-upgrade-rubygem-abrtredhat-upgrade-rubygem-abrt-docredhat-upgrade-rubygem-bigdecimalredhat-upgrade-rubygem-bigdecimal-debuginforedhat-upgrade-rubygem-bundlerredhat-upgrade-rubygem-io-consoleredhat-upgrade-rubygem-io-console-debuginforedhat-upgrade-rubygem-irbredhat-upgrade-rubygem-jsonredhat-upgrade-rubygem-json-debuginforedhat-upgrade-rubygem-minitestredhat-upgrade-rubygem-mysql2redhat-upgrade-rubygem-mysql2-debuginforedhat-upgrade-rubygem-mysql2-debugsourceredhat-upgrade-rubygem-mysql2-docredhat-upgrade-rubygem-pgredhat-upgrade-rubygem-pg-debuginforedhat-upgrade-rubygem-pg-debugsourceredhat-upgrade-rubygem-pg-docredhat-upgrade-rubygem-power_assertredhat-upgrade-rubygem-psychredhat-upgrade-rubygem-psych-debuginforedhat-upgrade-rubygem-raccredhat-upgrade-rubygem-racc-debuginforedhat-upgrade-rubygem-rakeredhat-upgrade-rubygem-rbsredhat-upgrade-rubygem-rbs-debuginforedhat-upgrade-rubygem-rdocredhat-upgrade-rubygem-rexmlredhat-upgrade-rubygem-rssredhat-upgrade-rubygem-test-unitredhat-upgrade-rubygem-typeprofredhat-upgrade-rubygemsredhat-upgrade-rubygems-devel
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.