Skip to content

Commit fdc00dc

Browse files
ylecuyerpostmodern
authored andcommitted
1 parent 5fbd487 commit fdc00dc

File tree

1 file changed

+13
-0
lines changed

1 file changed

+13
-0
lines changed

rubies/ruby/CVE-2021-33621.yml

Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,13 @@
1+
---
2+
engine: ruby
3+
cve: 2021-33621
4+
url: https://www.ruby-lang.org/en/news/2022/11/22/http-response-splitting-in-cgi-cve-2021-33621/
5+
title: HTTP response splitting in CGI
6+
date: 2022-11-22
7+
description: |
8+
If an application that generates HTTP responses using the cgi gem with untrusted user input, an attacker can exploit it to inject a malicious HTTP response header and/or body.
9+
10+
Also, the contents for a CGI::Cookie object were not checked properly. If an application creates a CGI::Cookie object based on user input, an attacker may exploit it to inject invalid attributes in Set-Cookie header. We think such applications are unlikely, but we have included a change to check arguments for CGI::Cookie#initialize preventatively.
11+
cvss_v3: 8.8
12+
patched_versions:
13+
- '>= 3.0.5'

0 commit comments

Comments
 (0)