CVE-2021-22881
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
2Exploited in Wild
-Decision
Descriptions
The Host Authorization middleware in Action Pack before 6.1.2.1, 6.0.3.5 suffers from an open redirect vulnerability. Specially crafted `Host` headers in combination with certain "allowed host" formats can cause the Host Authorization middleware in Action Pack to redirect users to a malicious website. Impacted applications will have allowed hosts with a leading dot. When an allowed host contains a leading dot, a specially crafted `Host` header can be used to redirect to a malicious website.
El middleware de Autorización de Host en Action Pack versiones anteriores a 6.1.2.1, 6.0.3.5 sufre una vulnerabilidad de redireccionamiento abierto. Los encabezados "Host" especialmente diseñados en combinación con determinados formatos "allowed host" pueden causar que el middleware de Autorización del Host en Action Pack redireccione a los usuarios a un sitio web malicioso. Las aplicaciones afectadas habrán permitido hosts con un punto inicial. Cuando un host permitido contiene un punto inicial, un encabezado "Host" especialmente diseñado puede ser usado para redireccionar hacia un sitio web malicioso
CVSS Scores
SSVC
- Decision:-
Timeline
- 2021-01-06 CVE Reserved
- 2021-02-11 CVE Published
- 2024-08-03 CVE Updated
- 2024-08-03 First Exploit
- 2024-10-29 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-601: URL Redirection to Untrusted Site ('Open Redirect')
CAPEC
References (7)
URL | Tag | Source |
---|---|---|
http://www.openwall.com/lists/oss-security/2021/05/05/2 | Mailing List | |
http://www.openwall.com/lists/oss-security/2021/08/20/1 | Mailing List |
URL | Date | SRC |
---|---|---|
http://www.openwall.com/lists/oss-security/2021/12/14/5 | 2024-08-03 | |
https://hackerone.com/reports/1047447 | 2024-08-03 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Rubyonrails Search vendor "Rubyonrails" | Rails Search vendor "Rubyonrails" for product "Rails" | >= 6.0.0 < 6.0.3.5 Search vendor "Rubyonrails" for product "Rails" and version " >= 6.0.0 < 6.0.3.5" | - |
Affected
| ||||||
Rubyonrails Search vendor "Rubyonrails" | Rails Search vendor "Rubyonrails" for product "Rails" | >= 6.1.0 < 6.1.2.1 Search vendor "Rubyonrails" for product "Rails" and version " >= 6.1.0 < 6.1.2.1" | - |
Affected
| ||||||
Fedoraproject Search vendor "Fedoraproject" | Fedora Search vendor "Fedoraproject" for product "Fedora" | 33 Search vendor "Fedoraproject" for product "Fedora" and version "33" | - |
Affected
|