8.8
CVSSv3

CVE-2021-33621

Published: 18/11/2022 Updated: 24/01/2024
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 0

Vulnerability Summary

The cgi gem prior to 0.1.0.2, 0.2.x prior to 0.2.2, and 0.3.x prior to 0.3.5 for Ruby allows HTTP response splitting. This is relevant to applications that use untrusted user input either to generate an HTTP response or to create a CGI::Cookie object.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

ruby-lang cgi

fedoraproject fedora 35

fedoraproject fedora 36

fedoraproject fedora 37

ruby-lang ruby

Vendor Advisories

Debian Bug report logs - #1024799 ruby31: CVE-2021-33621 Package: src:ruby31; Maintainer for src:ruby31 is Debian Ruby Team <pkg-ruby-extras-maintainers@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Fri, 25 Nov 2022 09:30:01 UTC Severity: important Tags: security, upstream ...
Synopsis Moderate: rh-ruby27-ruby security, bug fix, and enhancement update Type/Severity Security Advisory: Moderate Red Hat Insights patch analysis Identify and remediate systems affected by this advisory View affected systems Topic An update for rh-ruby27-ruby is now available for Red Hat Software CollectionsRed Hat Product Sec ...
Synopsis Moderate: ruby:27 security, bug fix, and enhancement update Type/Severity Security Advisory: Moderate Red Hat Insights patch analysis Identify and remediate systems affected by this advisory View affected systems Topic An update for the ruby:27 module is now available for Red Hat Enterprise Linux 8Red Hat Product Securi ...
概要 Moderate: ruby:25 security update タイプ/重大度 Security Advisory: Moderate Red Hat Insights パッチ分析 このアドバイザリーの影響を受けるシステムを特定し、修正します。 影響を受けるシステムの表示 トピック An update for the ruby:25 module is now available for Red Hat E ...
DescriptionThe MITRE CVE dictionary describes this issue as: The cgi gem before 0102, 02x before 022, and 03x before 035 for Ruby allows HTTP response splitting This is relevant to applications that use untrusted user input either to generate an HTTP response or to create a CGI::Cookie object ...
The cgi gem before 0102, 02x before 022, and 03x before 035 for Ruby allows HTTP response splitting This is relevant to applications that use untrusted user input either to generate an HTTP response or to create a CGI::Cookie object (CVE-2021-33621) ...
The cgi gem before 0102, 02x before 022, and 03x before 035 for Ruby allows HTTP response splitting This is relevant to applications that use untrusted user input either to generate an HTTP response or to create a CGI::Cookie object (CVE-2021-33621) ...
The cgi gem before 0102, 02x before 022, and 03x before 035 for Ruby allows HTTP response splitting This is relevant to applications that use untrusted user input either to generate an HTTP response or to create a CGI::Cookie object (CVE-2021-33621) ...
The cgi gem before 0102, 02x before 022, and 03x before 035 for Ruby allows HTTP response splitting This is relevant to applications that use untrusted user input either to generate an HTTP response or to create a CGI::Cookie object (CVE-2021-33621) ...