Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 829219 (CVE-2021-44528) - <dev-ruby/actionpack-{,}: open redirect vulnerability
Summary: <dev-ruby/actionpack-{,}: open redirect vulnerability
Alias: CVE-2021-44528
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal minor (vote)
Assignee: Gentoo Security
Whiteboard: B4 [stable?]
Depends on:
Reported: 2021-12-15 00:30 UTC by John Helmert III
Modified: 2021-12-15 21:25 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Note You need to log in before you can comment on or make changes to this bug.
Description John Helmert III gentoo-dev Security 2021-12-15 00:30:13 UTC
From URL:

Specially crafted "X-Forwarded-Host" headers in combination with certain
"allowed host" formats can cause the Host Authorization middleware in Action
Pack to redirect users to a malicious website.

Impacted applications will have allowed hosts with a leading dot. For
configuration files that look like this:

config.hosts <<  ''

When an allowed host contains a leading dot, a specially crafted Host header
can be used to redirect to a malicious website.

This vulnerability is similar to CVE-2021-22881 and CVE-2021-22942."

Please bump to actionpack-
Comment 1 Hans de Graaff gentoo-dev 2021-12-15 05:42:50 UTC
This requires rails and The x.4.2 releases were broken. Rails 5.2 is not affected.
Comment 2 Hans de Graaff gentoo-dev 2021-12-15 06:17:23 UTC
Rails and are now available. I'll file a stable bug for actionpack and related dependencies in a few days.
Comment 3 John Helmert III gentoo-dev Security 2021-12-15 21:25:53 UTC