CVE-2021-41819

CWE-56511 documents9 sources
Severity
7.5HIGH
EPSS
0.8%
top 26.76%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJan 1
Latest updateFeb 3

Description

CGI::Cookie.parse in Ruby through 2.6.8 mishandles security prefixes in cookie names. This also affects the CGI gem through 0.3.0 for Ruby.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:NExploitability: 3.9 | Impact: 3.6

Affected Packages5 packages

NVDruby-lang/ruby2.7.02.7.5+2
Debianruby2.7< 2.7.4-1+deb11u1
NVDruby-lang/cgi0.1.0, 0.2.0, 0.3.0+2
RubyGemscgi0.3.00.3.1+2
NVDopensuse/leap15.2

Also affects: Debian Linux 10.0, 11.0, 9.0, Fedora 34, 35, Linux Enterprise 11.0, 12.0, 15.0, Enterprise Linux 8.0

🔴Vulnerability Details

5
OSV
Cookie Prefix Spoofing in CGI::Cookie.parse2022-01-21
GHSA
Cookie Prefix Spoofing in CGI::Cookie.parse2022-01-21
OSV
ruby2.3, ruby2.5, ruby2.7 vulnerabilities2022-01-18
OSV
CVE-2021-41819: CGI::Cookie2022-01-01
CVEList
CVE-2021-41819: CGI::Cookie2022-01-01

📋Vendor Advisories

4
Ubuntu
Ruby vulnerabilities2022-01-18
Microsoft
CGI::Cookie.parse in Ruby through 2.6.8 mishandles security prefixes in cookie names. This also affects the CGI gem through 0.3.0 for Ruby.2022-01-11
Red Hat
ruby: Cookie prefix spoofing in CGI::Cookie.parse2021-11-24
Debian
CVE-2021-41819: ruby2.7 - CGI::Cookie.parse in Ruby through 2.6.8 mishandles security prefixes in cookie n...2021

💬Community

1
HackerOne
Ruby CVE-2021-41819: Cookie Prefix Spoofing in CGI::Cookie.parse2022-02-03