Lucene search

K
cve[email protected]CVE-2021-29479
HistoryJun 29, 2021 - 3:15 p.m.

CVE-2021-29479

2021-06-2915:15:18
CWE-807
web.nvd.nist.gov
49
ratpack
cve-2021-29479
web applications
cache poisoning
security vulnerability
publicaddress
serverconfigbuilder
nvd

4 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:H/Au:N/C:P/I:P/A:N

7 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

HIGH

Availability Impact

LOW

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:L

6.4 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

40.1%

Ratpack is a toolkit for creating web applications. In versions prior to 1.9.0, a user supplied X-Forwarded-Host header can be used to perform cache poisoning of a cache fronting a Ratpack server if the cache key does not include the X-Forwarded-Host header as a cache key. Users are only vulnerable if they do not configure a custom PublicAddress instance. For versions prior to 1.9.0, by default, Ratpack utilizes an inferring version of PublicAddress which is vulnerable. This can be used to perform redirect cache poisoning where an attacker can force a cached redirect to redirect to their site instead of the intended redirect location. The vulnerability was patched in Ratpack 1.9.0. As a workaround, ensure that ServerConfigBuilder::publicAddress correctly configures the server in production.

Affected configurations

Vulners
NVD
Node
ratpackratpackRange<1.9.0
VendorProductVersionCPE
ratpackratpack*cpe:2.3:a:ratpack:ratpack:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "product": "ratpack",
    "vendor": "ratpack",
    "versions": [
      {
        "status": "affected",
        "version": "< 1.9.0"
      }
    ]
  }
]

4 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:H/Au:N/C:P/I:P/A:N

7 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

HIGH

Availability Impact

LOW

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:L

6.4 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

40.1%

Related for CVE-2021-29479