CGI::Cookie.parse in Ruby through 2.6.8 mishandles security prefixes in cookie names. This also affects the CGI gem through 0.3.0 for Ruby.
{
"versions": [
{
"introduced": "0"
},
{
"last_affected": "0.1.0"
},
{
"introduced": "0"
},
{
"last_affected": "0.2.0"
},
{
"introduced": "0"
},
{
"last_affected": "0.3.0"
}
]
}{
"versions": [
{
"introduced": "0"
},
{
"last_affected": "2.6.8"
},
{
"introduced": "2.7.0"
},
{
"fixed": "2.7.5"
},
{
"introduced": "3.0.0"
},
{
"fixed": "3.0.3"
}
]
}[
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "8.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "9.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "10.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "11.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "11.0-sp1"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "12.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "15.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "15.2"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "34"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "35"
}
]
}
]
[
{
"target": {
"file": "ext/cgi/escape/escape.c"
},
"id": "CVE-2021-41819-11445fd0",
"digest": {
"line_hashes": [
"221608888545214764521643589590002473795",
"62837079863855754692353823286478885059",
"151633818343694841750591657495653307518",
"112628295566100827065348454738811594068"
],
"threshold": 0.9
},
"source": "https://github.com/ruby/ruby/commit/3fb7d2cadc18472ec107b14234933b017a33c14d",
"signature_version": "v1",
"deprecated": false,
"signature_type": "Line"
},
{
"target": {
"function": "optimized_escape_html",
"file": "ext/cgi/escape/escape.c"
},
"id": "CVE-2021-41819-2f76299c",
"digest": {
"function_hash": "185553476159107413192269642060714357735",
"length": 658.0
},
"source": "https://github.com/ruby/ruby/commit/f69aeb83146be640995753667fdd6c6f157527f5",
"signature_version": "v1",
"deprecated": false,
"signature_type": "Function"
},
{
"target": {
"file": "ext/cgi/escape/escape.c"
},
"id": "CVE-2021-41819-799f160e",
"digest": {
"line_hashes": [
"221608888545214764521643589590002473795",
"62837079863855754692353823286478885059",
"151633818343694841750591657495653307518",
"112628295566100827065348454738811594068"
],
"threshold": 0.9
},
"source": "https://github.com/ruby/ruby/commit/f69aeb83146be640995753667fdd6c6f157527f5",
"signature_version": "v1",
"deprecated": false,
"signature_type": "Line"
},
{
"target": {
"function": "optimized_escape_html",
"file": "ext/cgi/escape/escape.c"
},
"id": "CVE-2021-41819-dfee3243",
"digest": {
"function_hash": "185553476159107413192269642060714357735",
"length": 658.0
},
"source": "https://github.com/ruby/ruby/commit/3fb7d2cadc18472ec107b14234933b017a33c14d",
"signature_version": "v1",
"deprecated": false,
"signature_type": "Function"
}
]
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-41819.json"