Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).
CVE-2021-22881 — Open Redirect in Rails
Severity
6.1MEDIUMNVD
EPSS
15.5%
top 5.34%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedFeb 11
Latest updateDec 14
Description
The Host Authorization middleware in Action Pack before 6.1.2.1, 6.0.3.5 suffers from an open redirect vulnerability. Specially crafted `Host` headers in combination with certain "allowed host" formats can cause the Host Authorization middleware in Action Pack to redirect users to a malicious website. Impacted applications will have allowed hosts with a leading dot. When an allowed host contains a leading dot, a specially crafted `Host` header can be used to redirect to a malicious website.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:NExploitability: 2.8 | Impact: 2.7
Affected Packages4 packages
Also affects: Fedora 33
Patches
🔴Vulnerability Details
6💥Exploits & PoCs
1Nuclei▶
Ruby on Rails - Open Redirect via Host Header Injection
📋Vendor Advisories
3💬Community
1HackerOne▶
The Host Authorization middleware in Action Pack is vulnerable to crafted X-Forwarded-Host values↗2021-11-18