Hide Forgot
cgi.rb in Ruby through 2.6.x, through 3.0x, and through 3.1.x allows HTTP header injection. If a CGI application using the CGI library inserts untrusted input into the HTTP response header, an attacker can exploit it to insert a newline character to split a header, and inject malicious content to deceive clients. References: https://www.ruby-lang.org/en/security/ https://www.ruby-lang.org/en/news/2022/11/22/http-response-splitting-in-cgi-cve-2021-33621/ https://github.com/rubysec/ruby-advisory-db/blob/master/gems/cgi/CVE-2021-33621.yml https://github.com/ruby/cgi/compare/v0.1.0.1...v0.1.0.2
Created ruby tracking bugs for this issue: Affects: fedora-35 [bug 2149707] Affects: fedora-36 [bug 2149710] Created ruby:2.7/ruby tracking bugs for this issue: Affects: fedora-35 [bug 2149708] Created ruby:3.0/ruby tracking bugs for this issue: Affects: fedora-35 [bug 2149709]
Note that this CVE is fixed in Ruby to 3.1.3, 3.0.5 or 2.7.7. https://www.ruby-lang.org/en/news/2022/11/24/ruby-3-1-3-released/ https://www.ruby-lang.org/en/news/2022/11/24/ruby-3-0-5-released/ https://www.ruby-lang.org/en/news/2022/11/24/ruby-2-7-7-released/