7.5

CVE-2021-41819

Exploit

CGI::Cookie.parse in Ruby through 2.6.8 mishandles security prefixes in cookie names. This also affects the CGI gem through 0.3.0 for Ruby.

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Ruby-langCgi Version0.1.0 SwPlatformruby
Ruby-langCgi Version0.2.0 SwPlatformruby
Ruby-langCgi Version0.3.0 SwPlatformruby
Ruby-langRuby Version <= 2.6.8
Ruby-langRuby Version >= 2.7.0 < 2.7.5
Ruby-langRuby Version >= 3.0.0 < 3.0.3
RedhatEnterprise Linux Version8.0
DebianDebian Linux Version9.0
DebianDebian Linux Version10.0
DebianDebian Linux Version11.0
SuseLinux Enterprise Version11.0 Updatesp1
SuseLinux Enterprise Version12.0
SuseLinux Enterprise Version15.0
OpensuseFactory Version-
OpensuseLeap Version15.2
FedoraprojectFedora Version34
FedoraprojectFedora Version35
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.88% 0.746
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 7.5 3.9 3.6
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
nvd@nist.gov 5 10 2.9
AV:N/AC:L/Au:N/C:N/I:P/A:N
134c704f-9b21-4f2e-91b3-4a467353bcc0 7.5 3.9 3.6
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
CWE-565 Reliance on Cookies without Validation and Integrity Checking

The product relies on the existence or values of cookies when performing security-critical operations, but it does not properly ensure that the setting is valid for the associated user.