[FREEBSD:84AB03B6-6C20-11ED-B519-080027F5FEC9] rubygem-cgi -- HTTP response splitting vulnerability

Severity High
Affected Packages 6
CVEs 1

Hiroshi Tokumaru reports:

    If an application that generates HTTP responses using the
    cgi gem with untrusted user input, an attacker can exploit
    it to inject a malicious HTTP response header and/or body.


    Also, the contents for a CGI::Cookie object
    were not checked properly. If an application creates a
    CGI::Cookie object based on user input, an
    attacker may exploit it to inject invalid attributes in
    Set-Cookie header. We think such applications
    are unlikely, but we have included a change to check
    arguments for CGI::Cookie#initialize
    preventatively.
Package Affected Version
pkg:freebsd/rubygem-cgi < 0.3.4
pkg:freebsd/ruby32 < 3.2.0.r1,1
pkg:freebsd/ruby31 < 3.1.3,1
pkg:freebsd/ruby30 < 3.0.5,1
pkg:freebsd/ruby27 < 2.7.7,1
pkg:freebsd/ruby < 2.7.7,1
Type Package URL Namespace Name / Product Version Distribution / Platform Arch Patch / Fix
Affected pkg:freebsd/rubygem-cgi rubygem-cgi < 0.3.4
Affected pkg:freebsd/ruby32 ruby32 < 3.2.0.r1,1
Affected pkg:freebsd/ruby31 ruby31 < 3.1.3,1
Affected pkg:freebsd/ruby30 ruby30 < 3.0.5,1
Affected pkg:freebsd/ruby27 ruby27 < 2.7.7,1
Affected pkg:freebsd/ruby ruby < 2.7.7,1
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...