Lucene search

K
rubygemsRubySecRUBY:RUBY-2021-33621
HistoryNov 21, 2022 - 9:00 p.m.

HTTP response splitting in CGI

2022-11-2121:00:00
RubySec
www.ruby-lang.org
34
http response splitting
cgi
gem
untrusted user input
attacker
exploit
http response header
body
cgi::cookie object
set-cookie header
attributes
vulnerability
software

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

If an application that generates HTTP responses using the cgi gem with untrusted user input, an attacker can exploit it to inject a malicious HTTP response header and/or body.

Also, the contents for a CGI::Cookie object were not checked properly. If an application creates a CGI::Cookie object based on user input, an attacker may exploit it to inject invalid attributes in Set-Cookie header. We think such applications are unlikely, but we have included a change to check arguments for CGI::Cookie#initialize preventatively.

Affected configurations

Vulners
Node
rubyrubyRange2.7.02.7.7
OR
rubyrubyRange3.0.03.0.5
OR
rubyrubyRange3.1.3
VendorProductVersionCPE
rubyruby*cpe:2.3:a:ruby:ruby:*:*:*:*:*:*:*:*

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H