vulnerability
Red Hat: CVE-2025-27221: uri: userinfo leakage in URI#join, URI#merge and URI#+ (Multiple Advisories)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
1 | (AV:L/AC:H/Au:N/C:P/I:N/A:N) | Mar 4, 2025 | Apr 24, 2025 | May 7, 2025 |
Severity
1
CVSS
(AV:L/AC:H/Au:N/C:P/I:N/A:N)
Published
Mar 4, 2025
Added
Apr 24, 2025
Modified
May 7, 2025
Description
In the URI gem before 1.0.3 for Ruby, the URI handling methods (URI.join, URI#merge, URI#+) have an inadvertent leakage of authentication credentials because userinfo is retained even after changing the host.
Solution(s)
redhat-upgrade-rubyredhat-upgrade-ruby-bundled-gemsredhat-upgrade-ruby-bundled-gems-debuginforedhat-upgrade-ruby-debuginforedhat-upgrade-ruby-debugsourceredhat-upgrade-ruby-default-gemsredhat-upgrade-ruby-develredhat-upgrade-ruby-docredhat-upgrade-ruby-libsredhat-upgrade-ruby-libs-debuginforedhat-upgrade-rubygem-abrtredhat-upgrade-rubygem-abrt-docredhat-upgrade-rubygem-bigdecimalredhat-upgrade-rubygem-bigdecimal-debuginforedhat-upgrade-rubygem-bundlerredhat-upgrade-rubygem-io-consoleredhat-upgrade-rubygem-io-console-debuginforedhat-upgrade-rubygem-irbredhat-upgrade-rubygem-jsonredhat-upgrade-rubygem-json-debuginforedhat-upgrade-rubygem-minitestredhat-upgrade-rubygem-mysql2redhat-upgrade-rubygem-mysql2-debuginforedhat-upgrade-rubygem-mysql2-debugsourceredhat-upgrade-rubygem-mysql2-docredhat-upgrade-rubygem-pgredhat-upgrade-rubygem-pg-debuginforedhat-upgrade-rubygem-pg-debugsourceredhat-upgrade-rubygem-pg-docredhat-upgrade-rubygem-power_assertredhat-upgrade-rubygem-psychredhat-upgrade-rubygem-psych-debuginforedhat-upgrade-rubygem-raccredhat-upgrade-rubygem-racc-debuginforedhat-upgrade-rubygem-rakeredhat-upgrade-rubygem-rbsredhat-upgrade-rubygem-rbs-debuginforedhat-upgrade-rubygem-rdocredhat-upgrade-rubygem-rexmlredhat-upgrade-rubygem-rssredhat-upgrade-rubygem-test-unitredhat-upgrade-rubygem-typeprofredhat-upgrade-rubygemsredhat-upgrade-rubygems-devel

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.