An open redirect vulnerability is fixed in Rails 7.0.4.1 with the new protection against open redirects from calling redirect_to with untrusted user input. In prior versions the developer was fully responsible for only providing trusted input. However the check introduced could allow an attacker to bypass with a carefully crafted URL resulting in an open redirect vulnerability.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 12 | all | rails | < 2:6.1.7.3+dfsg-1 | rails_2:6.1.7.3+dfsg-1_all.deb |
Debian | 11 | all | rails | < 2:6.0.3.7+dfsg-2+deb11u2 | rails_2:6.0.3.7+dfsg-2+deb11u2_all.deb |
Debian | 10 | all | rails | < 2:5.2.2.1+dfsg-1+deb10u3 | rails_2:5.2.2.1+dfsg-1+deb10u3_all.deb |
Debian | 999 | all | rails | < 2:6.1.7.3+dfsg-3 | rails_2:6.1.7.3+dfsg-3_all.deb |
Debian | 13 | all | rails | < 2:6.1.7.3+dfsg-3 | rails_2:6.1.7.3+dfsg-3_all.deb |