CVE-2021-33621

Source
https://cve.org/CVERecord?id=CVE-2021-33621
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2021-33621.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2021-33621
Aliases
Downstream
Related
Published
2022-11-18T23:15:18.987Z
Modified
2026-02-12T07:37:34.487710Z
Severity
  • 8.8 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

The cgi gem before 0.1.0.2, 0.2.x before 0.2.2, and 0.3.x before 0.3.5 for Ruby allows HTTP response splitting. This is relevant to applications that use untrusted user input either to generate an HTTP response or to create a CGI::Cookie object.

References

Affected packages

Git / github.com/ruby/ruby

Affected versions

Other
v2_7_0
v2_7_1
v2_7_2
v2_7_3
v2_7_4
v2_7_5
v2_7_6
v3_0_0
v3_0_1
v3_0_2
v3_0_3
v3_0_4
v3_1_0
v3_1_1
v3_1_2

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2021-33621.json"

Git / gitlab.com/wireshark/wireshark

Affected ranges

Type
GIT
Repo
https://gitlab.com/wireshark/wireshark
Events

Affected versions

v3.*
v3.0.0
v3.0.1
v3.0.1rc0
v3.0.2
v3.0.2rc0
v3.0.3
v3.0.3rc0
v3.0.4
v3.0.4rc0
v3.0.5rc0
wireshark-3.*
wireshark-3.0.0
wireshark-3.0.1
wireshark-3.0.2
wireshark-3.0.3
wireshark-3.0.4

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2021-33621.json"