Ruby-lang

Cgi

5 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.47%
  • Published 04.03.2025 00:15:31
  • Last modified 05.03.2025 14:05:15

In the CGI gem before 0.4.2 for Ruby, the CGI::Cookie.parse method in the CGI library contains a potential Denial of Service (DoS) vulnerability. The method does not impose any limit on the length of the raw cookie value it processes. This oversight ...

  • EPSS 0.34%
  • Published 04.03.2025 00:15:31
  • Last modified 05.03.2025 14:05:49

In the CGI gem before 0.4.2 for Ruby, a Regular Expression Denial of Service (ReDoS) vulnerability exists in the Util#escapeElement method.

Exploit
  • EPSS 2.49%
  • Published 18.11.2022 23:15:18
  • Last modified 21.11.2024 06:09:12

The cgi gem before 0.1.0.2, 0.2.x before 0.2.2, and 0.3.x before 0.3.5 for Ruby allows HTTP response splitting. This is relevant to applications that use untrusted user input either to generate an HTTP response or to create a CGI::Cookie object.

Exploit
  • EPSS 0.91%
  • Published 06.02.2022 21:15:07
  • Last modified 21.11.2024 06:26:48

CGI.escape_html in Ruby before 2.7.5 and 3.x before 3.0.3 has an integer overflow and resultant buffer overflow via a long string on platforms (such as Windows) where size_t and long have different numbers of bytes. This also affects the CGI gem befo...

Exploit
  • EPSS 0.88%
  • Published 01.01.2022 06:15:07
  • Last modified 22.05.2025 15:15:54

CGI::Cookie.parse in Ruby through 2.6.8 mishandles security prefixes in cookie names. This also affects the CGI gem through 0.3.0 for Ruby.