CVE-2017-11173 — Project Rack-cors vulnerability
8 documents5 sources
Severity
8.8HIGHNVD
EPSS
1.8%
top 17.38%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJul 13
Latest updateJul 31
Description
Missing anchor in generated regex for rack-cors before 0.4.1 allows a malicious third-party site to perform CORS requests. If the configuration were intended to allow only the trusted example.com domain name and not the malicious example.net domain name, then example.com.example.net (as well as example.com-example.net) would be inadvertently allowed.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9
Affected Packages3 packages
Also affects: Debian Linux 9.0
Patches
🔴Vulnerability Details
3📋Vendor Advisories
1Debian▶
CVE-2017-11173: ruby-rack-cors - Missing anchor in generated regex for rack-cors before 0.4.1 allows a malicious ...↗2017
💬Community
3Bugzilla▶
CVE-2017-11173 rubygem-rack-cors: Missing anchor in generated regex in rack/cors.rb#L256 may permit forged malicious requests [fedora-all]↗2017-07-13
Bugzilla▶
CVE-2017-11173 rubygem-rack-cors: Missing anchor in generated regex in rack/cors.rb#L256 may permit forged malicious requests [epel-all]↗2017-07-13
Bugzilla▶
CVE-2017-11173 rubygem-rack-cors: Missing anchor in generated regex in rack/cors.rb#L256 may permit forged malicious requests↗2017-07-13