Description
The actionpack ruby gem before 6.1.3.2 suffers from a possible open redirect vulnerability. Specially crafted Host headers in combination with certain "allowed host" formats can cause the Host Authorization middleware in Action Pack to redirect users to a malicious website. This is similar to CVE-2021-22881. Strings in config.hosts that do not have a leading dot are converted to regular expressions without proper escaping. This causes, for example, `config.hosts << "sub.example.com"` to permit a request with a Host header value of `sub-example.com`.
Remediation
References
Related Vulnerabilities
Oracle Database Server CVE-2009-1020 Vulnerability (CVE-2009-1020)
Oracle Database Server CVE-2009-3414 Vulnerability (CVE-2009-3414)
WordPress Plugin 3D Tag Cloud Cross-Site Request Forgery (3.8)
MySQL CVE-2016-5436 Vulnerability (CVE-2016-5436)
WordPress Plugin WP Better Permalinks Cross-Site Request Forgery (3.0.4)