9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
0.008 Low
EPSS
Percentile
81.6%
CGI.escape_html in Ruby before 2.7.5 and 3.x before 3.0.3 has an integer
overflow and resultant buffer overflow via a long string on platforms (such
as Windows) where size_t and long have different numbers of bytes. This
also affects the CGI gem before 0.3.1 for Ruby.
Author | Note |
---|---|
leosilva | introduced by https://github.com/ruby/cgi/commit/3a62e20f76ea42ff0b4d45f2952479eab266ae1c |
github.com/ruby/cgi/commit/c728632c1c09d46cfd4ecbff9caaa3651dd1002a
launchpad.net/bugs/cve/CVE-2021-41816
nvd.nist.gov/vuln/detail/CVE-2021-41816
security-tracker.debian.org/tracker/CVE-2021-41816
ubuntu.com/security/notices/USN-5235-1
www.cve.org/CVERecord?id=CVE-2021-41816
www.ruby-lang.org/en/news/2021/11/24/buffer-overrun-in-cgi-escape_html-cve-2021-41816/
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
0.008 Low
EPSS
Percentile
81.6%