Lucene search

K
rubygemsRubySecRUBY:CGI-2021-33621
HistoryNov 17, 2022 - 9:00 p.m.

HTTP response splitting in CGI

2022-11-1721:00:00
RubySec
www.ruby-lang.org
14
cgi
ruby
http response splitting

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

cgi.rb in Ruby through 2.6.x, through 3.0x, and through 3.1.x allows HTTP
header injection. If a CGI application using the CGI library inserts
untrusted input into the HTTP response header, an attacker can exploit it to
insert a newline character to split a header, and inject malicious content to
deceive clients.

Affected configurations

Vulners
Node
rubycgiRange0.1.00.1.0.2
OR
rubycgiRange0.2.00.2.2
OR
rubycgiRange0.3.5
VendorProductVersionCPE
rubycgi*cpe:2.3:a:ruby:cgi:*:*:*:*:*:*:*:*

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H