Vulnerability Details CVE-2021-22881
The Host Authorization middleware in Action Pack before 6.1.2.1, 6.0.3.5 suffers from an open redirect vulnerability. Specially crafted `Host` headers in combination with certain "allowed host" formats can cause the Host Authorization middleware in Action Pack to redirect users to a malicious website. Impacted applications will have allowed hosts with a leading dot. When an allowed host contains a leading dot, a specially crafted `Host` header can be used to redirect to a malicious website.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.069
EPSS Ranking 91.0%
CVSS Severity
CVSS v3 Score 6.1
CVSS v2 Score 5.8
Products affected by CVE-2021-22881
-
cpe:2.3:a:rubyonrails:rails:6.0.0
-
cpe:2.3:a:rubyonrails:rails:6.0.1
-
cpe:2.3:a:rubyonrails:rails:6.0.2
-
cpe:2.3:a:rubyonrails:rails:6.0.2.1
-
cpe:2.3:a:rubyonrails:rails:6.0.2.2
-
cpe:2.3:a:rubyonrails:rails:6.0.3
-
cpe:2.3:a:rubyonrails:rails:6.0.3.1
-
cpe:2.3:a:rubyonrails:rails:6.0.3.2
-
cpe:2.3:a:rubyonrails:rails:6.0.3.3
-
cpe:2.3:a:rubyonrails:rails:6.0.3.4
-
cpe:2.3:a:rubyonrails:rails:6.1.0
-
cpe:2.3:a:rubyonrails:rails:6.1.1
-
cpe:2.3:a:rubyonrails:rails:6.1.2
-
cpe:2.3:o:fedoraproject:fedora:33