CVE-2021-41819

Source
https://cve.org/CVERecord?id=CVE-2021-41819
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-41819.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2021-41819
Aliases
Downstream
Related
Published
2022-01-01T06:15:07.293Z
Modified
2026-03-14T11:14:19.583286Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N CVSS Calculator
Summary
[none]
Details

CGI::Cookie.parse in Ruby through 2.6.8 mishandles security prefixes in cookie names. This also affects the CGI gem through 0.3.0 for Ruby.

References

Affected packages

Git / github.com/ruby/cgi

Affected ranges

Type
GIT
Repo
https://github.com/ruby/cgi
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
Database specific
{
    "versions": [
        {
            "introduced": "0"
        },
        {
            "last_affected": "0.1.0"
        },
        {
            "introduced": "0"
        },
        {
            "last_affected": "0.2.0"
        },
        {
            "introduced": "0"
        },
        {
            "last_affected": "0.3.0"
        }
    ]
}
Type
GIT
Repo
https://github.com/ruby/ruby
Events
Database specific
{
    "versions": [
        {
            "introduced": "0"
        },
        {
            "last_affected": "2.6.8"
        },
        {
            "introduced": "2.7.0"
        },
        {
            "fixed": "2.7.5"
        },
        {
            "introduced": "3.0.0"
        },
        {
            "fixed": "3.0.3"
        }
    ]
}

Affected versions

v0.*
v0.1.0

Database specific

unresolved_ranges
[
    {
        "events": [
            {
                "introduced": "0"
            },
            {
                "last_affected": "8.0"
            }
        ]
    },
    {
        "events": [
            {
                "introduced": "0"
            },
            {
                "last_affected": "9.0"
            }
        ]
    },
    {
        "events": [
            {
                "introduced": "0"
            },
            {
                "last_affected": "10.0"
            }
        ]
    },
    {
        "events": [
            {
                "introduced": "0"
            },
            {
                "last_affected": "11.0"
            }
        ]
    },
    {
        "events": [
            {
                "introduced": "0"
            },
            {
                "last_affected": "11.0-sp1"
            }
        ]
    },
    {
        "events": [
            {
                "introduced": "0"
            },
            {
                "last_affected": "12.0"
            }
        ]
    },
    {
        "events": [
            {
                "introduced": "0"
            },
            {
                "last_affected": "15.0"
            }
        ]
    },
    {
        "events": [
            {
                "introduced": "0"
            },
            {
                "last_affected": "15.2"
            }
        ]
    },
    {
        "events": [
            {
                "introduced": "0"
            },
            {
                "last_affected": "34"
            }
        ]
    },
    {
        "events": [
            {
                "introduced": "0"
            },
            {
                "last_affected": "35"
            }
        ]
    }
]
vanir_signatures
[
    {
        "target": {
            "file": "ext/cgi/escape/escape.c"
        },
        "id": "CVE-2021-41819-11445fd0",
        "digest": {
            "line_hashes": [
                "221608888545214764521643589590002473795",
                "62837079863855754692353823286478885059",
                "151633818343694841750591657495653307518",
                "112628295566100827065348454738811594068"
            ],
            "threshold": 0.9
        },
        "source": "https://github.com/ruby/ruby/commit/3fb7d2cadc18472ec107b14234933b017a33c14d",
        "signature_version": "v1",
        "deprecated": false,
        "signature_type": "Line"
    },
    {
        "target": {
            "function": "optimized_escape_html",
            "file": "ext/cgi/escape/escape.c"
        },
        "id": "CVE-2021-41819-2f76299c",
        "digest": {
            "function_hash": "185553476159107413192269642060714357735",
            "length": 658.0
        },
        "source": "https://github.com/ruby/ruby/commit/f69aeb83146be640995753667fdd6c6f157527f5",
        "signature_version": "v1",
        "deprecated": false,
        "signature_type": "Function"
    },
    {
        "target": {
            "file": "ext/cgi/escape/escape.c"
        },
        "id": "CVE-2021-41819-799f160e",
        "digest": {
            "line_hashes": [
                "221608888545214764521643589590002473795",
                "62837079863855754692353823286478885059",
                "151633818343694841750591657495653307518",
                "112628295566100827065348454738811594068"
            ],
            "threshold": 0.9
        },
        "source": "https://github.com/ruby/ruby/commit/f69aeb83146be640995753667fdd6c6f157527f5",
        "signature_version": "v1",
        "deprecated": false,
        "signature_type": "Line"
    },
    {
        "target": {
            "function": "optimized_escape_html",
            "file": "ext/cgi/escape/escape.c"
        },
        "id": "CVE-2021-41819-dfee3243",
        "digest": {
            "function_hash": "185553476159107413192269642060714357735",
            "length": 658.0
        },
        "source": "https://github.com/ruby/ruby/commit/3fb7d2cadc18472ec107b14234933b017a33c14d",
        "signature_version": "v1",
        "deprecated": false,
        "signature_type": "Function"
    }
]
source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-41819.json"