7.5
CVE-2021-22885
- EPSS 0.97%
- Veröffentlicht 27.05.2021 12:15:07
- Zuletzt bearbeitet 21.11.2024 05:50:50
- Quelle support@hackerone.com
- Teams Watchlist Login
- Unerledigt Login
A possible information disclosure / unintended method execution vulnerability in Action Pack >= 2.0.0 when using the `redirect_to` or `polymorphic_url`helper with untrusted user input.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Rubyonrails ≫ Rails Version >= 5.2.0.0 < 5.2.4.6
Rubyonrails ≫ Rails Version >= 6.0.0.0 < 6.0.3.7
Rubyonrails ≫ Rails Version >= 6.1.0.0 < 6.1.3.1
Rubyonrails ≫ Actionpack Page-caching Version-
Debian ≫ Debian Linux Version10.0
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.97% | 0.758 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
nvd@nist.gov | 7.5 | 3.9 | 3.6 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
|
nvd@nist.gov | 5 | 10 | 2.9 |
AV:N/AC:L/Au:N/C:P/I:N/A:N
|
CWE-209 Generation of Error Message Containing Sensitive Information
The product generates an error message that includes sensitive information about its environment, users, or associated data.