CVE-2021-41819

CGI::Cookie.parse in Ruby through 2.6.8 mishandles security prefixes in cookie names. This also affects the CGI gem through 0.3.0 for Ruby.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:ruby-lang:ruby:*:*:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:*:*:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:cgi:0.3.0:*:*:*:*:ruby:*:*
cpe:2.3:a:ruby-lang:cgi:0.2.0:*:*:*:*:ruby:*:*
cpe:2.3:a:ruby-lang:cgi:0.1.0:*:*:*:*:ruby:*:*
cpe:2.3:a:ruby-lang:ruby:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:software_collections:-:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise:15.0:*:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise:11.0:sp1:*:*:*:*:*:*

Configuration 5 (hide)

OR cpe:2.3:a:opensuse:factory:-:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*

Configuration 6 (hide)

OR cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*

History

08 May 2022, 04:15

Type Values Removed Values Added
References
  • (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IUXQCH6FRKANCVZO2Q7D2SQX33FP3KWN/ -
  • (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UTOJGS5IEFDK3UOO7IY4OTTFGHGLSWZF/ -

11 Feb 2022, 15:32

Type Values Removed Values Added
CWE NVD-CWE-noinfo CWE-565
References (CONFIRM) https://security.netapp.com/advisory/ntap-20220121-0003/ - (CONFIRM) https://security.netapp.com/advisory/ntap-20220121-0003/ - Third Party Advisory
References (MISC) https://hackerone.com/reports/910552 - Permissions Required (MISC) https://hackerone.com/reports/910552 - Permissions Required, Third Party Advisory

21 Jan 2022, 12:15

Type Values Removed Values Added
References
  • (CONFIRM) https://security.netapp.com/advisory/ntap-20220121-0003/ -

12 Jan 2022, 15:27

Type Values Removed Values Added
CPE cpe:2.3:a:redhat:software_collections:-:*:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:*:*:*:*:*:*:*:*
cpe:2.3:a:opensuse:factory:-:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise:15.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise:11.0:sp1:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:cgi:0.2.0:*:*:*:*:ruby:*:*
cpe:2.3:a:ruby-lang:cgi:0.3.0:*:*:*:*:ruby:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:cgi:0.1.0:*:*:*:*:ruby:*:*
CVSS v2 : unknown
v3 : unknown
v2 : 5.0
v3 : 7.5
First Time Ruby-lang cgi
Debian debian Linux
Fedoraproject
Suse
Ruby-lang ruby
Debian
Redhat software Collections
Suse linux Enterprise
Opensuse leap
Opensuse factory
Fedoraproject fedora
Redhat enterprise Linux
Opensuse
Ruby-lang
Redhat
CWE NVD-CWE-noinfo
References (CONFIRM) https://www.ruby-lang.org/en/news/2021/11/24/cookie-prefix-spoofing-in-cgi-cookie-parse-cve-2021-41819/ - (CONFIRM) https://www.ruby-lang.org/en/news/2021/11/24/cookie-prefix-spoofing-in-cgi-cookie-parse-cve-2021-41819/ - Exploit, Vendor Advisory
References (MISC) https://hackerone.com/reports/910552 - (MISC) https://hackerone.com/reports/910552 - Permissions Required

01 Jan 2022, 06:15

Type Values Removed Values Added
New CVE

Information

Published : 2022-01-01 06:15

Updated : 2022-05-08 04:15


NVD link : CVE-2021-41819

Mitre link : CVE-2021-41819


JSON object : View

Products Affected

suse

  • linux_enterprise

redhat

  • enterprise_linux
  • software_collections

opensuse

  • factory
  • leap

ruby-lang

  • cgi
  • ruby

debian

  • debian_linux

fedoraproject

  • fedora
CWE
CWE-565

Reliance on Cookies without Validation and Integrity Checking