Lucene search

K
cveHackeroneCVE-2023-22797
HistoryFeb 09, 2023 - 8:15 p.m.

CVE-2023-22797

2023-02-0920:15:11
CWE-601
hackerone
web.nvd.nist.gov
80
cve-2023-22797
rails
open redirect
vulnerability
nvd

CVSS3

6.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

AI Score

5.8

Confidence

High

EPSS

0.001

Percentile

26.6%

An open redirect vulnerability is fixed in Rails 7.0.4.1 with the new protection against open redirects from calling redirect_to with untrusted user input. In prior versions the developer was fully responsible for only providing trusted input. However the check introduced could allow an attacker to bypass with a carefully crafted URL resulting in an open redirect vulnerability.

Affected configurations

Nvd
Vulners
Node
actionpack_projectactionpackRange7.0.07.0.4.1ruby
OR
rubyonrailsrailsRange7.0.07.0.4.1
VendorProductVersionCPE
actionpack_projectactionpack*cpe:2.3:a:actionpack_project:actionpack:*:*:*:*:*:ruby:*:*
rubyonrailsrails*cpe:2.3:a:rubyonrails:rails:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "vendor": "n/a",
    "product": "https://github.com/rails/rails",
    "versions": [
      {
        "version": "7.0.4.1",
        "status": "affected"
      }
    ]
  }
]

CVSS3

6.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

AI Score

5.8

Confidence

High

EPSS

0.001

Percentile

26.6%