8.8

CVE-2021-33621

Exploit

The cgi gem before 0.1.0.2, 0.2.x before 0.2.2, and 0.3.x before 0.3.5 for Ruby allows HTTP response splitting. This is relevant to applications that use untrusted user input either to generate an HTTP response or to create a CGI::Cookie object.

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Ruby-langCgi SwPlatformruby Version < 0.1.0.2
Ruby-langCgi SwPlatformruby Version >= 0.2.0 < 0.2.2
Ruby-langCgi SwPlatformruby Version >= 0.3.0 < 0.3.5
FedoraprojectFedora Version35
FedoraprojectFedora Version36
FedoraprojectFedora Version37
Ruby-langRuby Version >= 2.7.0 < 2.7.7
Ruby-langRuby Version >= 3.0.0 < 3.0.5
Ruby-langRuby Version >= 3.1.0 < 3.1.3
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 2.49% 0.848
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 8.8 2.8 5.9
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CWE-74 Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')

The product constructs all or part of a command, data structure, or record using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify how it is parsed or interpreted when it is sent to a downstream component.