Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!

Bug 829219 (CVE-2021-44528)

Summary: <dev-ruby/actionpack-{6.0.4.3,6.1.4.3}: open redirect vulnerability
Product: Gentoo Security Reporter: John Helmert III <ajak>
Component: VulnerabilitiesAssignee: Gentoo Security <security>
Status: IN_PROGRESS ---    
Severity: minor CC: ruby
Priority: Normal    
Version: unspecified   
Hardware: All   
OS: Linux   
URL: https://www.openwall.com/lists/oss-security/2021/12/14/5
Whiteboard: B4 [glsa?]
Package list:
Runtime testing required: ---

Description John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2021-12-15 00:30:13 UTC
From URL:

"Impact
------
Specially crafted "X-Forwarded-Host" headers in combination with certain
"allowed host" formats can cause the Host Authorization middleware in Action
Pack to redirect users to a malicious website.

Impacted applications will have allowed hosts with a leading dot. For
example,
configuration files that look like this:

```
config.hosts <<  '.EXAMPLE.com'
```

When an allowed host contains a leading dot, a specially crafted Host header
can be used to redirect to a malicious website.

This vulnerability is similar to CVE-2021-22881 and CVE-2021-22942."

Please bump to actionpack-6.1.4.2.
Comment 1 Hans de Graaff gentoo-dev Security 2021-12-15 05:42:50 UTC
This requires rails 6.0.4.3 and 6.1.4.3. The x.4.2 releases were broken. Rails 5.2 is not affected.
Comment 2 Hans de Graaff gentoo-dev Security 2021-12-15 06:17:23 UTC
Rails 6.0.4.3 and 6.1.4.3 are now available. I'll file a stable bug for actionpack and related dependencies in a few days.
Comment 3 John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2021-12-15 21:25:53 UTC
Thanks!
Comment 4 John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2022-08-16 19:56:11 UTC
Tree seems clean now, this only affects >=actionpack-6.