CGI::Cookie.parse in Ruby through 2.6.8 mishandles security prefixes in cookie names. This also affects the CGI gem through 0.3.0 for Ruby.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
Configuration 6 (hide)
|
History
22 May 2025, 15:15
Type | Values Removed | Values Added |
---|---|---|
References | () https://hackerone.com/reports/910552 - Permissions Required, Third Party Advisory | |
References | () https://security.netapp.com/advisory/ntap-20220121-0003/ - Third Party Advisory | |
References | () https://www.ruby-lang.org/en/news/2021/11/24/cookie-prefix-spoofing-in-cgi-cookie-parse-cve-2021-41819/ - Exploit, Vendor Advisory |
24 Jan 2024, 05:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
07 Nov 2023, 03:39
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2022-01-01 06:15
Updated : 2025-05-22 15:15
NVD link : CVE-2021-41819
Mitre link : CVE-2021-41819
JSON object : View
Products Affected
debian
- debian_linux
redhat
- enterprise_linux
- software_collections
opensuse
- factory
- leap
fedoraproject
- fedora
ruby-lang
- cgi
- ruby
suse
- linux_enterprise
CWE
CWE-565
Reliance on Cookies without Validation and Integrity Checking