vulnerability
Ubuntu: (CVE-2017-11173): ruby-rack-cors vulnerability
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
7 | (AV:N/AC:M/Au:N/C:P/I:P/A:P) | Jul 13, 2017 | Nov 19, 2024 | May 27, 2025 |
Severity
7
CVSS
(AV:N/AC:M/Au:N/C:P/I:P/A:P)
Published
Jul 13, 2017
Added
Nov 19, 2024
Modified
May 27, 2025
Description
Missing anchor in generated regex for rack-cors before 0.4.1 allows a malicious third-party site to perform CORS requests. If the configuration were intended to allow only the trusted example.com domain name and not the malicious example.net domain name, then example.com.example.net (as well as example.com-example.net) would be inadvertently allowed.
Solution
ubuntu-upgrade-ruby-rack-cors
References
- CVE-2017-11173
- https://attackerkb.com/topics/CVE-2017-11173
- DEBIAN-DSA-3931
- URL-http://seclists.org/fulldisclosure/2017/Jul/22
- URL-https://github.com/cyu/rack-cors/commit/42ebe6caa8e85ffa9c8a171bda668ba1acc7a5e6
- URL-https://packetstormsecurity.com/files/143345/rack-cors-Missing-Anchor.html
- URL-https://www.cve.org/CVERecord?id=CVE-2017-11173

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.