UBUNTU-CVE-2021-44528

See a problem?
Source
https://ubuntu.com/security/notices/UBUNTU-CVE-2021-44528
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2021/UBUNTU-CVE-2021-44528.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2021-44528
Related
Published
2022-01-10T14:10:00Z
Modified
2022-01-10T14:10:00Z
Severity
  • 6.1 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N CVSS Calculator
Summary
[none]
Details

A open redirect vulnerability exists in Action Pack >= 6.0.0 that could allow an attacker to craft a "X-Forwarded-Host" headers in combination with certain "allowed host" formats can cause the Host Authorization middleware in Action Pack to redirect users to a malicious website.

References

Affected packages

Ubuntu:22.04:LTS / rails

Package

Name
rails

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2:6.*

2:6.0.3.7+dfsg-2
2:6.1.4.1+dfsg-8ubuntu2

Ecosystem specific

{
    "ubuntu_priority": "medium"
}

Ubuntu:24.04:LTS / rails

Package

Name
rails

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2:6.*

2:6.1.7.3+dfsg-2build1
2:6.1.7.3+dfsg-3

Ecosystem specific

{
    "ubuntu_priority": "medium"
}