CGI::Cookie.parse in Ruby through 2.6.8 mishandles security prefixes in cookie names. This also affects the CGI gem through 0.3.0 for Ruby.
References
Link | Resource |
---|---|
https://hackerone.com/reports/910552 | Permissions Required Third Party Advisory |
https://www.ruby-lang.org/en/news/2021/11/24/cookie-prefix-spoofing-in-cgi-cookie-parse-cve-2021-41819/ | Exploit Vendor Advisory |
https://security.netapp.com/advisory/ntap-20220121-0003/ | Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UTOJGS5IEFDK3UOO7IY4OTTFGHGLSWZF/ | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IUXQCH6FRKANCVZO2Q7D2SQX33FP3KWN/ | Mailing List Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
Configuration 6 (hide)
|
Information
Published : 2021-12-31 22:15
Updated : 2022-09-09 19:39
NVD link : CVE-2021-41819
Mitre link : CVE-2021-41819
JSON object : View
CWE
CWE-565
Reliance on Cookies without Validation and Integrity Checking
Products Affected
ruby-lang
- ruby
- cgi
redhat
- enterprise_linux
- software_collections
suse
- linux_enterprise
fedoraproject
- fedora
opensuse
- leap
- factory
debian
- debian_linux