CVE-2021-44528: URL Redirection to Untrusted Site ('Open Redirect')
(updated )
A open redirect vulnerability exists in Action Pack >= 6.0.0 that could allow an attacker to craft a “X-Forwarded-Host” headers in combination with certain “allowed host” formats can cause the Host Authorization middleware in Action Pack to redirect users to a malicious website.
References
- github.com/advisories/GHSA-qphc-hf5q-v8fc
- github.com/rails/rails/blob/v6.1.4.2/actionpack/CHANGELOG.md
- github.com/rails/rails/commit/0fccfb9a3097a9c4260c791f1a40b128517e7815
- github.com/rails/rails/commit/aecba3c301b80e9d5a63c30ea1b287bceaf2c107
- groups.google.com/g/ruby-security-ann/c/vG9gz3nk1pM/m/7-NU4MNrDAAJ?utm_medium=email&utm_source=footer
- nvd.nist.gov/vuln/detail/CVE-2021-44528
Detect and mitigate CVE-2021-44528 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →